ThreatWise TV Episode 8: The fundamentals of XDR
14:34
On this episode of ThreatWise TV, we discuss Extended Detection and Response (XDR) and how Cisco helps organizations make XDR work most effectively.
Related Videos
In ThreatWiseTV
-
Play video ThreatWise TV Episode 9: Snort Trends
ThreatWise TV Episode 9: Snort Trends
We look at a variety of ways Snort can be utilized to protect organizations. We also analyze Snort data gathered by Cisco Secure Firewall, and talk about the vulnerabilities and exploits that attackers targeted most often.
16:33
-
Play video Introducing Secure MSP Center
Introducing Secure MSP Center
If you are an SMB MSP, join us for an overview of the simplified MSP Center offering that allows for signup and customer provisioning in minutes. New support facilities and dashboards are also now available.
5:09
-
Play video People Matter: A look back on how Cisco Talos has been supporting Ukraine
People Matter: A look back on how Cisco Talos has been supporting Ukraine
In this special documentary edition of ThreatWise TV, we take a look at the people behind Talos’s efforts to protect Ukrainian critical infrastructure, and discuss the personal impact on the teams involved.
16:19
-
Play video An End User's Guide to Cybersecurity Awareness
An End User's Guide to Cybersecurity Awareness
As an end user, there are 5 main areas of cybersecurity concern: email, social media, passwords, device hardening, and credit protection. I'll walk you through each one to make sure you won't be the next victim!
11:02
-
Play video ThreatWise TV Episode 7: How malicious actors are using Office file formats
ThreatWise TV Episode 7: How malicious actors are using Office file formats
Vanja Svajcer of Cisco Talos discusses his research tracking malicious actors. In this episode, he demonstrates where attackers have pivoted, after Microsoft disabled Visual Basics for Applications macros by default.
13:48
-
Play video Cisco Hybrid Work
Cisco Hybrid Work
Learn how multiple security technologies work together to protect hybrid workers from both end user and administrator perspective.
10:46