Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-10-26 12:50:53 |
ThreatWise TV: Exploring Recent Incident Response Trends (lien direct) |
This ThreatWise TV episode, we are examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report. |
|
|
|
|
2022-10-25 12:00:57 |
Talking IoT Security at the White House (lien direct) |
Leaders convened at the White House to discuss security challenges concerning IoT devices and how we can solve them. |
Guideline
|
|
★★★
|
|
2022-10-24 12:00:49 |
Ensuring Security in M&A: An Evolution, Not Revolution (lien direct) |
Through decades of acquisitions, Cisco has gained the expertise and experience to make M&A seamless and successful by making cybersecurity a priority throughout the integration process. |
|
|
|
|
2022-10-21 12:00:27 |
How can I help protect my company from phishing attacks? (lien direct) |
Discover the ways you can help your organization avoid becoming a target of Business Email Compromise, a particularly dangerous and costly form of phishing. |
|
|
|
|
2022-10-20 15:30:51 |
There\'s no better time for zero trust (lien direct) |
Learn how to implement a holistic zero trust strategy (at your own pace!) that improves security resilience without sacrificing user experience. |
|
|
|
|
2022-10-19 12:00:53 |
(Déjà vu) RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don\'t You Go Dox Yourself?”) (lien direct) |
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. |
|
|
|
|
2022-10-17 12:00:09 |
Making Merger and Acquisition Cybersecurity More Manageable (lien direct) |
Part of the secret to Cisco's success is its ability to acquire companies that strengthen its technology portfolio and securely integrate them into the larger organization. |
|
|
|
|
2022-10-14 15:00:34 |
Introducing “NEXT” by Cisco Secure (lien direct) |
We are thrilled to announce “NEXT” by Cisco Secure, our new video series showcasing the future of technology and how to best secure it. |
|
|
|
|
2022-10-13 12:00:08 |
(Déjà vu) COLLECTING OUR BREADCRUMBS (Pt. 2 of “Why Don\'t You Go Dox Yourself?”) (lien direct) |
This step-by-step guide on doxxing that makes protecting yourself online easy, accessible, and maybe even fun. |
|
|
|
|
2022-10-11 12:00:35 |
Data Transparency and its Impact on Customer Trust (lien direct) |
The Cisco 2022 Consumer Privacy Survey explores what organizations can do to earn and build trust with customers who want more transparency and control of data. |
|
|
|
|
2022-10-10 12:00:47 |
When It Comes to M&A, Security Is a Journey (lien direct) |
One of the key considerations, when an organization acquires a company, is ensuring that the security posture of their solutions and infrastructure meet the necessary security standards. |
|
|
|
|
2022-10-10 12:00:40 |
Cybersecurity Re-Launchers: Pivoting into Cybersecurity as a Mid-Career Professional (lien direct) |
It is never too late to start a career in cybersecurity. If you are passionate about the topic and are ready to put in the work to acquire the skills and knowledge needed, anyone, regardless of educational background, can break into cybersecurity. |
|
|
|
|
2022-10-07 12:00:17 |
Why Don\'t You Go Dox Yourself? (lien direct) |
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. |
|
|
|
|
2022-10-06 12:00:55 |
Employee Volunteer Program Supports Youth Globally (lien direct) |
Cisco's employee volunteer program provides employees with paid time to contribute to their communities including supporting youth locally and globally. |
|
|
|
|
2022-10-03 16:31:59 |
The Upcoming UK Telecoms (Security) Act Part One: What, Why, Who, When and How (lien direct) |
The Telecoms Security Requirements (TSRs) are rapidly approaching. Here, we outline what they mean for UK firms, and what they can do to prepare. |
|
|
|
|
2022-10-03 12:00:31 |
Demonstrating Trust and Transparency in Mergers and Acquisitions (lien direct) |
The importance of demonstrating security transparency and trust during the mergers and acquisition process. |
|
|
|
|
2022-09-28 12:00:04 |
Defend your organization from ransomware attacks with Cisco Secure Endpoint (lien direct) |
Ransomware attacks are continuously evolving and difficult to stop. Learn how Cisco Secure Endpoint defends your organization from ransomware attacks. |
Ransomware
|
|
|
|
2022-09-27 12:00:27 |
Cyber Insurance and the Attribution Conundrum (lien direct) |
Claiming on cyber insurance policies is soon to depend on attack attribution. What does this mean for CISOs and insurers? |
|
|
|
|
2022-09-27 12:00:24 |
Threat Trends: Vulnerabilities (lien direct) |
Are the most talked about vulnerabilities the same as those that are most widely used in attacks? |
|
|
|
|
2022-09-26 12:00:08 |
Managing Cybersecurity Risk in M&A (lien direct) |
Why risk management, assessment, and assurance are vital to establishing cybersecurity confidence during the M&A process. |
|
|
|
|
2022-09-22 08:59:11 |
(Déjà vu) Unscrambling Cybersecurity Acronyms: The ABCs of EDR and MEDR Security (lien direct) |
Deciphering the many security acronyms is hard, making it tough to identify the best fit for you. Read this blog to get an overview of EDR and MEDR solutions. |
|
|
|
|
2022-09-20 12:00:36 |
The 4 Lenses of Resilience and What They Mean for Security (lien direct) |
What makes a business resilient? Learn more about how to prepare for security attacks, minimize risk and recover faster by investing in four types of resilience. |
|
|
|
|
2022-09-12 16:28:01 |
Cisco Secure 5 Best Practices Security Analysts Can Use to Secure Their Hybrid Workforce. (lien direct) |
Nobody Makes Hybrid, Work Better: 5 Best Practices Security Analysts Can Use to Secure Their Hybrid Workforce |
|
|
|
|
2022-08-31 12:00:22 |
Know Thyself: 10 Ways to Discover Your Work Environment Needs and What It\'s Really Like to Work at Cisco (lien direct) |
What do you need to succeed at work? Cisco Secure and Duo Security leaders give 10 tips to discern a company's culture and an inside look at working at Cisco. |
Guideline
|
|
|
|
2022-08-29 08:43:43 |
Black Hat USA 2022: Creating Hacker Summer Camp (lien direct) |
From our joint success at Black Hat Asia 2022, Cisco was invited to build the network for the Black Hat USA flagship conference, known as 'Hacker Summer Camp'. |
|
|
★★★
|
|
2022-08-29 08:43:08 |
Black Hat USA 2022 Continued: Innovation in the NOC (lien direct) |
Cisco is a Premium Partner of the Black Hat NOC, and is the Official Wired & Wireless Network Equipment, Mobile Device Management, DNS (Domain Name Service) and Malware Analysis Provider of Black Hat. |
Malware
|
|
★★★
|
|
2022-08-26 08:00:42 |
The Case for Multi-Vendor Security Integrations (lien direct) |
Just like the myriad expanding galaxies seen in the latest images from the James Webb space telescope, the cybersecurity landscape consists of a growing number of security technology vendors, each with the goal of addressing the continually evolving threats faced by customers today. In order to be effective, cybersecurity tools have to be collaborative-be it […] |
|
|
|
|
2022-08-24 17:00:48 |
Cisco Talos - Our not-so-secret threat intel advantage (lien direct) |
Security tools are only as good as the threat intelligence and expertise that feeds them. Learn how Talos helps power our portfolio and protect our customers. |
Threat
|
|
★★★★★
|
|
2022-08-23 13:00:16 |
Announcing SOC 2 Compliance for Cisco Secure Endpoint, Cisco Secure Malware Analytics, and Cisco SecureX (lien direct) |
We are excited to announce that we have achieved SOC 2 compliance for the Cisco Secure Endpoint solution, Cisco Malware Analytics, and the Cisco SecureX platform! SOC 2 is a compliance framework developed by the American Institute of Certified Public Accountants (AICPA) that helps ensure organizations responsibly handle customer data |
Malware
|
|
|
|
2022-08-18 16:00:32 |
Our Responsible Approach to Governing Artificial Intelligence (lien direct) |
This introduction to Gartner's research describes Cisco's responsible approach to AI with a focus on transparency, security and privacy to protect human rights. |
|
|
|
|
2022-08-09 16:19:29 |
Raspberry Robin: Highly Evasive Worm Spreads over External Disks (lien direct) |
During our threat hunting exercises in recent months, we've started to observe a distinguishing pattern of msiexec.exe usage across different endpoints. |
Threat
|
|
|
|
2022-07-28 16:11:59 |
Unscrambling Cybersecurity Acronyms: The ABCs of Endpoint Security (lien direct) |
Deciphering the many security acronyms is hard, making it tough to identify the best fit for you. Read this blog to learn how to choose the right solution. |
|
|
|
|
2022-07-27 12:00:44 |
Advocating for Passion, Kindness and Women in STEM (lien direct) |
A Cisco leader identifies strategies to develop a dynamic cybersecurity career path and ways to advocate for women in STEM. |
Guideline
|
|
|
|
2022-07-27 11:00:30 |
More than a VPN: Announcing Cisco Secure Client (formerly AnyConnect) (lien direct) |
Announcing Cisco Secure Client, the unified security agent for Cisco Secure. Formerly AnyConnect, Secure Client offers a shared user interface for tighter remote access and management of Cisco endpoint security agents. |
|
|
|
|
2022-07-26 20:00:27 |
Securing Cloud is Everyone\'s Responsibility (lien direct) |
Cisco and AWS demonstrate shared responsibility that identifies Security “of” the Cloud versus Security “in” the Cloud. |
|
|
|
|
2022-07-26 12:00:23 |
Cisco and AWS: Securing your resilience in a hybrid cloud world (lien direct) |
Cisco Secure is furthering its partnership with AWS to drive security resilience in a hybrid world. Check out our blog to learn about our latest announcements at AWS Re:Inforce, including our new Secure Firewall innovation. |
|
|
|
|
2022-07-25 12:00:20 |
Cisco Salutes the League of Cybersecurity Heroes (lien direct) |
Learn more about the fantastic Cisco Insider Advocates that make up the League of Cybersecurity Heroes. |
|
|
|
|
2022-07-22 12:00:56 |
A Unique Cybersecurity Career Path: From Journalism to Cisco (lien direct) |
A Cisco leader shares her strategies for crafting a cybersecurity career path and managing through creative problem solving, direct feedback and self-awareness. |
Guideline
|
|
|
|
2022-07-19 12:00:22 |
(Déjà vu) Security Resilience in APJC (lien direct) |
How do organizations across APJC fare when it comes to security resilience? We turned to findings from our Security Outcomes Study to find out. |
|
|
|
|
2022-07-18 16:15:39 |
Get Comprehensive Insights into Your Network with Secure Analytics and MITRE Mappings (lien direct) |
A deep dive into the latest updates from Secure Network and Cloud Analytics that show Cisco's leadership in the Security Industry. |
Guideline
|
|
|
|
2022-07-11 12:00:43 |
Ransomware attacks can and will shut you down (lien direct) |
Ransomware attacks on educational institutions are devastating and with the transition to remote learning and remote work a security solution protecting your endpoints are critical |
Ransomware
|
|
★★★
|
|
2022-07-08 10:09:50 |
Simplified SaaS Security for MSPs – Cisco Secure is now open in Canada (lien direct) |
The opportunity for delivering best-in-class security as a managed service provider (MSP) while simplifying the provider experience is here today. |
|
|
|
|
2022-07-06 12:00:00 |
Security Resilience in the Americas (lien direct) |
How do organizations in the Americas fare across security outcomes critical for building resilience, like avoiding major security incidents and retaining personnel? |
|
|
|
|
2022-06-30 16:13:12 |
Top of Mind Security Insights from In-Person Interactions (lien direct) |
After two years of virtual engagements, in-person events underscore the power of face-to-face interactions. It's a reminder of just how enriching conversations are and how incredibly interconnected the world is. And it's only made closer by the security experiences that impact us all. |
|
|
|
|
2022-06-30 15:00:42 |
ESG\'s Report on the Role of XDR in SOC Modernization (lien direct) |
Read the ESG “SOC Modernization and the Role of XDR” eBook to gain insights on a recent survey of cybersecurity professionals exploring five key trends in security operations. |
|
|
|
|
2022-06-29 16:00:54 |
What do customers really want (and need) from security? (lien direct) |
In today's world, security must meet many diverse needs. At RSAC and Cisco Live, our customers shared with us exactly what they require to stay cyber resilient. |
|
|
|
|
2022-06-29 12:00:15 |
Cloud Security Resources and Guidance (lien direct) |
Highlights risks and applicable security resources in different cloud delivery models and deployment scenarios that organizations should be aware of. |
|
|
|
|
2022-06-28 15:56:55 |
Cisco Talos Supports Ukraine Through Empathy (lien direct) |
Cisco Talos leaders working in Ukraine share how encouraging empathy and self-care supports employees working and living in the region. |
Guideline
|
|
|
|
2022-06-22 16:00:58 |
Per Mar Security remains resilient as threats evolve (lien direct) |
Cisco Secure helps Per Mar Security Services remain cyber resilient in the face of change. Hear how the company rapidly detects and mitigates threats while enabling hybrid work. |
Threat
|
|
|
|
2022-06-16 12:00:35 |
People: A cornerstone for fostering security resilience (lien direct) |
SecOps programs built on strong people, processes and technology see a 3.5X performance boost over those with weaker resources, according to our study. |
|
|
|