Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-05-25 12:00:30 |
Revisiting the Session: The Potential for Shared Signals (lien direct) |
A session is the heart of secure access. Granting a session requires trust. But how do we evaluate that trust effectively if relevant signals are in siloes? |
|
|
|
|
2022-05-24 21:20:16 |
Get More from Your Cybersecurity Spend When Inflation Rates Climb (lien direct) |
Find out how you can stretch your organization's cybersecurity budget amidst inflation and its economic impacts with a Cisco Secure Choice Enterprise Agreement. |
|
|
|
|
2022-05-20 12:00:16 |
Introducing new cloud resources page for Cisco Secure Firewall (lien direct) |
In this blog we are introducing brand new web page that provide all key resources for customers and partners looking to automate firewall deployment in the cloud. |
|
|
|
|
2022-05-18 14:00:02 |
Your employees are everywhere. Is your security? (lien direct) |
Hybrid work is here to stay. Learn how you can empower your employees to work from anywhere, while still maintaining security resilience. |
|
|
★★
|
|
2022-05-17 12:00:59 |
Securing Your Migration to the Cloud (lien direct) |
Cisco Secure powers security resilience enabling you to protect the integrity of your business amidst unpredictable threats and major change, such as migrating to the cloud. |
Threat
|
|
|
|
2022-05-17 00:33:29 |
Tour the RSA Conference 2022 Security Operations Center (lien direct) |
Register now for your free tour of the RSA Conference Security Operations Center (SOC), where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored by NetWitness and Cisco Secure. |
|
|
|
|
2022-05-16 12:00:14 |
Global Snack Manufacturer Becomes Cyber Resilient While Cutting Production Costs (lien direct) |
Companies aren't doing business the way they used to, and the shift to hybrid work has forced many to become increasingly security resilient or cease operations. The global food market is no exception. |
|
|
|
|
2022-05-12 16:23:03 |
Duo Opens New Data Center in India (lien direct) |
Data localization is becoming increasingly important in India. Opening a new center, Cisco's Duo shows commitment to the local clients. |
|
|
★★
|
|
2022-05-12 16:21:59 |
Network Footprints of Gamaredon Group (lien direct) |
This blog post contains observations of Cognitive Intelligence Team over Gamaredon Group's activities during the month of March 2022 |
|
|
★★★★
|
|
2022-05-11 15:00:05 |
It\'s a party! Cisco SecureX at RSAC and Cisco Live US 2022 (lien direct) |
Visit Cisco SecureX at RSAC and Cisco Live 2022 to see our radically simple security with a platform approach that is transforming the industry and protecting our customers. |
|
|
★★★
|
|
2022-05-10 13:57:11 |
Fostering a culture that normalizes mental health discussions (lien direct) |
May is Mental Health Awareness Month, an important topic to me personally and my leadership ethos. It is a challenge that spans the globe-day-in and day-out. |
Guideline
|
|
★★★
|
|
2022-05-10 12:00:26 |
Cisco Partner Story: Security Resilience is a Journey, Not a Destination (lien direct) |
Mark Lynd, Head of Digital Business at NETSYNC, shares his cybersecurity philosophy and how his organization helps security resilience. |
|
|
★★
|
|
2022-05-05 12:00:33 |
Announcing the public availability of the Cisco Cloud Controls Framework (CCF) (lien direct) |
We are proud to announce the general availability of the Cisco Cloud Controls Framework (CCF) for public use, accessible at trust.cisco.com/compliance/ccf. |
|
|
|
|
2022-05-04 18:13:08 |
Cisco StarOS Forensic Guide Published (lien direct) |
This document provides steps for assessing the integrity of and collecting forensic information from the Cisco ASR5000 and ASR5500 family of platforms, and Quantum Virtual Packet Core (QVPC) virtual machines running Cisco StarOS Software. |
|
|
|
|
2022-05-03 14:18:37 |
Detecting Targeted Attacks on Public Cloud Services with Cisco Secure Cloud Analytics (lien direct) |
Secure Analytics Targeted Attack Denonia AWS Lambda Detection Security |
|
|
|
|
2022-05-03 06:31:47 |
ISE business value and ROI uncovered in Forrester study (lien direct) |
Looking to deploy ISE? Forrester conducted a study to uncover the business value and ROI of Cisco Identity Services Engine (ISE) and revealed a 191% return. |
|
|
★★
|
|
2022-04-28 12:00:21 |
The More You Know: Job Searching & Interviewing (lien direct) |
Recruiters and hiring managers at Cisco and Duo Security share useful tips for those job searching and interviewing in the cybersecurity and tech industries. |
|
|
|
|
2022-04-27 12:00:59 |
Cisco Duo Security Completes Australia\'s Information Security Registered Assessors Program (IRAP) Assessment (lien direct) |
Cisco Duo Security Completes Australia's Information Security Registered Assessors Program (IRAP) Assessment |
|
|
|
|
2022-04-26 12:00:43 |
Improvise, Adapt, Overcome: Building Security Resilience in a World of Uncertainty (lien direct) |
Which practices have the greatest impact when building security resilience? We asked industry experts to share their success stories.
|
|
|
|
|
2022-04-25 15:00:30 |
Security resilience from the classroom to the cloud (lien direct) |
Security resilience is crucial for all organizations. Learn how the Shawnee Heights School District stays cyber safe and ready for the future. |
|
|
|
|
2022-04-20 12:00:30 |
Security Resilience in EMEA (lien direct) |
How do organizations across the EMEA region fare when it comes to security resilience? |
|
|
|
|
2022-04-19 15:00:27 |
Cisco Secure Endpoint Shines in the 2022 MITRE® Engenuity ATT&CK Evaluation (lien direct) |
The 2022 MITRE® Engenuity ATT&CK Evaluation results are in, and Cisco Secure Endpoint proved it can stop Wizard Spider and Sandworm attack campaigns early in the kill chain and provide analytic detections. |
|
|
|
|
2022-04-12 16:46:17 |
Router Spring Cleaning – No MOP Required - Again (lien direct) |
DECNET MOP in Cisco IOS/IOS-XE allows remote login via VTY by default, and ignores much of the configuration in the "line vty" configuration stanzas.
|
|
|
|
|
2022-04-11 15:00:54 |
Announcing Risk-Based Endpoint Security with Cisco Secure Endpoint and Kenna Security (lien direct) |
Secure Endpoint's Kenna integration introduces risk-based endpoint security, enabling accelerated incident responses and enhanced threat investigations. |
Threat
|
|
|
|
2022-04-08 15:00:46 |
Secure your Endpoints and Turbocharge your Security Operations with Cisco Secure Endpoint (lien direct) |
Discover how Cisco Secure Endpoint can radically simplify your security, maximize your security operations, and help you achieve peace of mind by protecting you from threats. |
|
|
|
|
2022-04-06 14:00:45 |
Enabling Security Resilience in the Face of Unpredictable Change (lien direct) |
Security resilience is confronting this new world where everyone and everything are connecting. Businesses are operating as integrated ecosystems with boundaries between the corporations, customers, suppliers and partners all blurring.
|
|
|
|
|
2022-04-06 12:00:52 |
The Wait is Over for Secure Firewall 3100 Series (lien direct) |
The wait is over for the Cisco Secure Firewall 3100 series. Make hybrid work and zero trust practical, with the flexibility to ensure strong return on investment with this new firewall series.
|
|
|
|
|
2022-04-04 12:00:28 |
Intelligent alert management (lien direct) |
We all know what alert fatigue is. In this blog, we explore how we tackle it. How does our Alert Fusion system work?
|
|
|
|
|
2022-03-31 18:00:07 |
New in SecureX: Device Insights (lien direct) |
The new device insights feature in Cisco SecureX allows you to gain centralized visibility into your organization's assets using a variety of sources. |
|
|
|
|
2022-03-31 12:00:10 |
The 5 dimensions of security resilience (lien direct) |
Recent events have made security resilience even more critical. Learn how your business can embrace resilience to navigate uncertain times and emerge stronger. |
|
|
|
|
2022-03-30 12:00:38 |
The Total Economic Impact™ of Cisco Secure Firewall (lien direct) |
Forrester Consulting proves how Cisco Secure Firewall customers saw improved visibility and control over their dynamic environments with savings of up to 95% of network workflows and up to 83% of security related workflows.
|
|
|
|
|
2022-03-28 17:29:48 |
Emotet is Back (lien direct) |
We summarise in this blog Emotet threat, it's lifecycle and typical detectable patterns. In the second part of the blog we show how to use GTA.
|
|
|
|
|
2022-03-25 15:30:26 |
Cisco Secure Endpoint Strikes Balance for School IT Teams (lien direct) |
Cisco's Endpoint Security solution defends school networks by blocking attacks at the endpoint before data is compromised, while also helping you respond to threats quickly and thoroughly. |
|
|
|
|
2022-03-24 12:00:04 |
So, what\'s the big deal about ISE 3.x? (lien direct) |
There is a lot of chatter around the 3.x release for Cisco Identity Services Engine, known to over 45,000 customers as ISE. So, what's the big deal about ISE 3.x?
|
|
|
|
|
2022-03-22 21:30:28 |
New Warning from the White House Calls for Urgent Action (lien direct) |
On Monday and based on evolving intelligence, President Biden warned of increased potential of cyberattacks on critical infrastructure in the United States and his administration renewed its calls for all organizations to bolster their cyber defenses in this Statement from the President. Learn how Cisco can help.
|
|
|
|
|
2022-03-18 15:00:54 |
Cisco Secure Endpoint goes Pro (lien direct) |
Discover the new Secure Endpoint Pro, and learn how it combines all the protections of Cisco Secure Endpoint with around the clock, Cisco-delivered security operations to drastically reduce the mean time to detect and respond to threats. |
|
|
|
|
2022-03-16 12:00:34 |
Continuity and recovery on the path towards resiliency (lien direct) |
Effective business continuity & disaster recovery (BCDR) should be a key component of 2022 security roadmaps. Our Advisory CISO explains why and analyzes key findings from our new #SecurityOutcomes Study.
|
|
|
|
|
2022-03-15 20:20:02 |
Cyber Actors Bypassing Two-Factor Authentication Implementations (lien direct) |
A recent FBI flash bulletin described how state-sponsored cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) in addition to bypassing Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This scenario did NOT leverage or reveal a vulnerability in Duo. |
Vulnerability
|
|
|
|
2022-03-11 16:00:42 |
Bringing Kenna Security into SecureX Orchestration (lien direct) |
With the latest SecureX orchestration workflow, you can leverage the power of Kenna to automate the process of gathering vulnerability and remediation data, putting it in front of the right resources faster, reducing your risk and time spent solving. |
Vulnerability
|
|
|
|
2022-03-10 13:00:20 |
Introducing the new \'Defending Against Critical Threats\' report (lien direct) |
How has the #cyberthreat landscape evolved in the last year? Find out in our annual Defending Against Critical Threats report. |
|
|
|
|
2022-03-09 13:00:10 |
Stay on target: How accurate threat detection leads to better defense (lien direct) |
How exactly can enhanced visibility increase our chances of guarding against data breaches and cyberattacks? Cisco Advisory CISO Dave Lewis (@gattaca) explains in part 4 of our blog series unpacking our latest #SecurityOutcomes study.
|
Threat
|
|
|
|
2022-03-08 13:00:27 |
Why I Joined Cisco (lien direct) |
What I knew more than anything was that my success as a leader could only be realized in partnership with a winning team at Cisco.
|
Guideline
|
|
|
|
2022-03-07 13:00:40 |
SASE and SSE: what you need to know (lien direct) |
Technology advances are meant to improve our lives. But with every new advancement and innovative framework there seems to come a new acronym to keep track of in the already crowded space of cybersecurity tech terms. C2. CSIR. SASE. And now, Security Service Edge, or SSE. Learn more. |
|
|
|
|
2022-03-01 13:00:26 |
Cisco\'s 7 Guiding Principles of Government Data Demands (lien direct) |
Cisco advocates for data privacy and human rights and has refreshed its Principled Approach to ensure robust protections are in place regarding government data requests.
|
|
|
|
|
2022-02-28 13:00:44 |
Cyber Asset Attack Surface Management with Cisco Secure Cloud Insights: Beyond CSPM (lien direct) |
In today's digital-first world having enterprise grade information, services, and workloads in the cloud is becoming increasingly important for success. Nonetheless the lack of asset visibility that haunted private networks has not disappeared in the cloud era; it has been transferred, or some may say even aggravated. This is where Secure Cloud Insights (SCI) steps in. |
|
|
|
|
2022-02-25 23:19:41 |
Q&A on the MITRE D3FEND Framework (lien direct) |
Pete Kaloroumakis of MITRE discusses the D3FEND framework, which, alongside the ATT&CK framework, seeks to improve cybersecurity for both private and public organizations. |
|
|
|
|
2022-02-24 16:00:27 |
Creating a Path to Successful Security Hygiene (lien direct) |
Read the “Security Hygiene and Posture Management” eBook to learn how you can better identify cyber-risks and defense gaps to improve your overall security best practices. |
|
|
|
|
2022-02-18 13:00:50 |
Network Security Automation using Cisco Secure Firewall and Hashicorp\'s Consul (lien direct) |
Cisco Secure Firewall integration with Hashicorp's Consul updates object mappings reducing manual ticketing tasks and ensuring efficient firewall access. |
|
|
|
|
2022-02-17 16:00:06 |
Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections (lien direct) |
Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX. |
|
|
|
|
2022-02-16 13:00:22 |
Headcount alone isn\'t enough for your headaches (lien direct) |
There's an overwhelming need to ensure enterprises can respond to threats in a timely matter. In part three of our #SecurityOutcomes Study blog series, Cisco Advisory CISO Dave Lewis shares the key elements of effective incident response. |
|
|
|