
- 2x
- 1.75x
- 1.5x
- 1.25x
- 1x, selected
- 0.75x
- 0.5x
- Chapters
- descriptions off, selected
- captions settings, opens captions settings dialog
- captions off, selected
This is a modal window.
Beginning of dialog window. Escape will cancel and close the window.
End of dialog window.
This is a modal window. This modal can be closed by pressing the Escape key or activating the close button.
This is a modal window. This modal can be closed by pressing the Escape key or activating the close button.
This is a modal window. This modal can be closed by pressing the Escape key or activating the close button.
This is a modal window.
ThreatWise TV episode 4: Cracking the code on security resilience
28:15
What are critical success factors to boosting security resilience, according to more than 4,700 IT and security pros across the globe? Cisco’s Advisory CISOs delve into the data from the Security Outcomes Report Volume 3.
Related Videos
In ThreatWiseTV
-
Play video State-sponsored campaigns target global network infrastructure
State-sponsored campaigns target global network infrastructure
In this video, Cisco Talos' Matt Olney and JJ Cummings explain Talos' ongoing research to track and research state-sponsored cyber attacks that target network infrastructure.
11:55
-
Play video An End User's Guide to Cybersecurity Awareness
An End User's Guide to Cybersecurity Awareness
As an end user, there are 5 main areas of cybersecurity concern: email, social media, passwords, device hardening, and credit protection. I'll walk you through each one to make sure you won't be the next victim!
11:02
-
Play video ThreatWise TV Episode 7: How malicious actors are using Office file formats
ThreatWise TV Episode 7: How malicious actors are using Office file formats
Vanja Svajcer of Cisco Talos discusses his research tracking malicious actors. In this episode, he demonstrates where attackers have pivoted, after Microsoft disabled Visual Basics for Applications macros by default.
13:48
-
Play video ThreatWise TV Episode 8: The fundamentals of XDR
ThreatWise TV Episode 8: The fundamentals of XDR
On this episode of ThreatWise TV, we discuss Extended Detection and Response (XDR) and how Cisco helps organizations make XDR work most effectively.
14:34
-
Play video ThreatWise TV Episode 9: Snort Trends
ThreatWise TV Episode 9: Snort Trends
We look at a variety of ways Snort can be utilized to protect organizations. We also analyze Snort data gathered by Cisco Secure Firewall, and talk about the vulnerabilities and exploits that attackers targeted most often.
16:33
-
Play video Cisco Hybrid Work
Cisco Hybrid Work
Learn how multiple security technologies work together to protect hybrid workers from both end user and administrator perspective.
10:46