ThreatWise TV Episode 8: The fundamentals of XDR
14:34
On this episode of ThreatWise TV, we discuss Extended Detection and Response (XDR) and how Cisco helps organizations make XDR work most effectively.
Related Videos
In ThreatWiseTV
-
Play video ThreatWise TV Episode 7: How malicious actors are using Office file formats
ThreatWise TV Episode 7: How malicious actors are using Office file formats
Vanja Svajcer of Cisco Talos discusses his research tracking malicious actors. In this episode, he demonstrates where attackers have pivoted, after Microsoft disabled Visual Basics for Applications macros by default.
13:48
-
Play video Secure Branch and SD-WAN Interview
Secure Branch and SD-WAN Interview
Threatwise interviews Barry Fisher and Rahul Ramikrishnan about the challenges of, and solutions for securing branch offices and leveraging SD-WAN technologies.
9:04
-
Play video ThreatWise TV Episode 9: Snort Trends
ThreatWise TV Episode 9: Snort Trends
We look at a variety of ways Snort can be utilized to protect organizations. We also analyze Snort data gathered by Cisco Secure Firewall, and talk about the vulnerabilities and exploits that attackers targeted most often.
16:33
-
Play video Cisco Security & Trust Keep Cisco Safe Trust Talks
Cisco Security & Trust Keep Cisco Safe Trust Talks
The Keep Cisco Safe program presents information to help employees and family members be more aware of cybersecurity threats.
13:10
-
Play video ThreatWise TV episode 4: Cracking the code on security resilience
ThreatWise TV episode 4: Cracking the code on security resilience
What are critical success factors to boosting security resilience, according to more than 4,700 IT and security pros across the globe? Cisco’s Advisory CISOs delve into the data from the Security Outcomes Report Volume 3.
28:15
-
Play video State-sponsored campaigns target global network infrastructure
State-sponsored campaigns target global network infrastructure
In this video, Cisco Talos' Matt Olney and JJ Cummings explain Talos' ongoing research to track and research state-sponsored cyber attacks that target network infrastructure.
11:55