Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2024-07-16 12:00:52 |
Protéger contre la régression avec la charge de travail sécurisée Protecting Against regreSSHion with Secure Workload (lien direct) |
La vulnérabilité Regresshion a pris d'assaut Internet.Découvrez comment la charge de travail sécurisée peut protéger votre organisation de cette vulnérabilités et d'autres.
The regreSSHion vulnerability has taken the internet by storm. Learn how Secure Workload can protect your organization from this and other vulnerabilities. |
Vulnerability
|
|
★★★
|
|
2024-05-06 11:55:36 |
Cisco Hypershield & # 8211;Notre vision de lutter contre les vulnérabilités inconnues Cisco Hypershield – Our Vision to Combat Unknown Vulnerabilities (lien direct) |
Cisco Hypershield peut aider à protéger les organisations à nouveau des vulnérabilités inconnues en détectant et en bloquant les vulnérabilités inconnues dans les charges de travail d'exécution.
Cisco Hypershield can help protect organizations agains unknown vulnerabilities by detecting and blocking unknown vulnerabilities in runtime workloads. |
Vulnerability
|
|
★★★
|
|
2024-03-07 13:00:54 |
Cisco Secure Workload 3.9 offre une sécurité plus forte et une plus grande efficacité opérationnelle Cisco Secure Workload 3.9 Delivers Stronger Security and Greater Operational Efficiency (lien direct) |
La nouvelle version de Cisco Secure Workload offre des capacités avancées pour atténuer les vulnérabilités et offrir une flexibilité maximale pour la mise en œuvre de la microsegmentation
The new release of Cisco Secure Workload delivers advanced capabilities to mitigate vulnerabilities and provide maximum flexibility for implementing microsegmentation |
Vulnerability
|
|
★★
|
|
2024-02-27 13:00:37 |
Avantages de l'ingestion de données d'Amazon Inspecteur dans la gestion de la vulnérabilité Cisco Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management (lien direct) |
Découvrez comment vous pouvez ingérer vos résultats de vulnérabilité spécifiques au cloud d'Amazon Inspector dans la gestion de la vulnérabilité Cisco pour une hiérarchisation efficace.
Learn how you can ingest your cloud-specific vulnerability findings from Amazon Inspector into Cisco Vulnerability Management for effective prioritization. |
Vulnerability
|
|
★★
|
|
2023-08-25 12:00:09 |
EPSS et son rôle dans la notation des risques liés à la gestion des vulnérabilités Cisco EPSS and Its Role in Cisco Vulnerability Management Risk Scoring (lien direct) |
Découvrez EPSS, comment il se compare à CVSS et le rôle qu'il joue dans l'évaluation des risques de Cisco Vulnerability Management.
Learn about EPSS, how it compares to CVSS, and the role it plays in Cisco Vulnerability Management\'s risk scoring. |
Vulnerability
|
|
★★★
|
|
2022-11-15 13:00:35 |
Kenna.VM Premier: Accelerate Vulnerability Management with Cisco Talos Intel and Remediation Analytics (lien direct) |
The new Kenna.VM Premier tier, which is designed for mature organizations, includes new zero-day intelligence from Cisco Talos an remediation analytics. |
Vulnerability
|
|
|
|
2022-03-15 20:20:02 |
Cyber Actors Bypassing Two-Factor Authentication Implementations (lien direct) |
A recent FBI flash bulletin described how state-sponsored cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) in addition to bypassing Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This scenario did NOT leverage or reveal a vulnerability in Duo. |
Vulnerability
|
|
|
|
2022-03-11 16:00:42 |
Bringing Kenna Security into SecureX Orchestration (lien direct) |
With the latest SecureX orchestration workflow, you can leverage the power of Kenna to automate the process of gathering vulnerability and remediation data, putting it in front of the right resources faster, reducing your risk and time spent solving. |
Vulnerability
|
|
|
|
2021-12-20 20:23:01 |
Defending Against Log4j Exploits with Cisco Secure Endpoint (lien direct) |
Learn how Cisco Secure Endpoint can rapidly protect your environment from attackers exploiting the Log4j vulnerability with robust prevention and advanced detection and response capabilities. |
Vulnerability
|
|
|
|
2021-12-17 13:00:11 |
How to Respond to Apache Log4j using Cisco Secure Analytics (lien direct) |
Security professionals are working to assess their exposure to Apache Log4j vulnerability (CVE-2021-44228). The following guide on how to respond is here. |
Vulnerability
|
|
|
|
2021-12-14 05:59:58 |
Protecting against Log4j with Secure Firewall & Secure IPS (lien direct) |
The Apache Log4j vulnerability (CVE-2021-44228) has taken the Internet by storm. Read ways Secure Firewall Threat Defense and Secure IPS users can protect against attacks. |
Threat
Vulnerability
|
|
|
|
2020-12-21 22:31:32 |
Talos Vulnerability Discovery Year in Review - 2020 (lien direct) |
While major attacks like ransomware and COVID-19-themed campaigns made headlines across the globe this year, many attacks were prevented through simple practices of finding, disclosing and patching vulnerabilities. Cisco Talos’ Systems Vulnerability Research Team discovered 231 vulnerabilities this year across a wide range of products. And thanks to our vendor partners, these vulnerabilities were patched […] |
Ransomware
Patching
Vulnerability
|
|
|