Learn how multiple security technologies work together to protect hybrid workers from both end user and administrator perspective.
In this video, Cisco Talos' Matt Olney and JJ Cummings explain Talos' ongoing research to track and research state-sponsored cyber attacks that target network infrastructure.
What are critical success factors to boosting security resilience, according to more than 4,700 IT and security pros across the globe? Cisco’s Advisory CISOs delve into the data from the Security Outcomes Report Volume 3.
Vanja Svajcer of Cisco Talos discusses his research tracking malicious actors. In this episode, he demonstrates where attackers have pivoted, after Microsoft disabled Visual Basics for Applications macros by default.
Using spreadsheets to track your endpoints? We do not approve! See how SecureX uses Device Insights to import, organize, and correlate data from any endpoint management application to reduce your investigation time and effort.
Secure Cloud Insights adds valuable context on cloud assets and their relationships to SecureX that leads to higher-fidelity alerts while accelerating investigation and response.
We look at a variety of ways Snort can be utilized to protect organizations. We also analyze Snort data gathered by Cisco Secure Firewall, and talk about the vulnerabilities and exploits that attackers targeted most often.