Product spotlight on mobile solutions

Product spotlight on mobile solutions

Mobile security solutions allow organizations to protect sensitive information and objects even when off-premises. Security magazine highlights both cyber and physical mobile security solutions. Cisco Duo Protect Identity Through Multi-Factor Authentication Duo’s Continuous Identity Security safeguards against intricate identity threats 24/7 while maintaining a smooth authentication experience for your entire workforce. Users can stay protected with flexible multi-factor authentication (MFA) including options using FIDO2 for phishing-resistant authentication. Image courtesy of Cisco Duo Find out more…

Read More

From Chaos to Clarity: Navigating Threats With Cisco XDR

From Chaos to Clarity: Navigating Threats With Cisco XDR

In an era where cyber threats evolve at breakneck speed, organizations face unprecedented challenges in protecting their data, systems, and operations. The stakes have never been higher, with cyberattacks capable of disrupting critical services, compromising sensitive information, and inflicting severe financial and reputational damage. Cisco XDR (Extended Detection and Response) emerges as a game-changing solution in this complex threat landscape. By providing comprehensive visibility and actionable insights across entire networks, Cisco XDR empowers organizations to…

Read More

Accessing Secure Client Cloud Management after the SecureX EoL

Accessing Secure Client Cloud Management after the SecureX EoL

With the SecureX End of Life (EoL) quickly approaching on July 31, 2024, we want to ensure you have accurate information on how you will be able to continue accessing Cisco Secure Client Cloud Management capabilities. Client Management capabilities are not going away as part of the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service. Cisco Secure Client is our security endpoint agent which contains many capabilities you may…

Read More

Product spotlight on risk and threat monitoring

Product spotlight on risk and threat monitoring

With rapidly-evolving threats and staffing shortages, it’s becoming harder for security leaders to monitor their organizations for potential threats. Security magazine highlights a few products that help keep critical systems safe from attack. CROWDSTRIKE Proactively Searches for Threats Falcon Adversary OverWatch is a 24/7 threat hunting service that spans endpoint, identity and cloud to disrupt adversaries. The software is powered by threat intelligence and artificial intelligence (AI). The software is designed to help analysts locate threats and…

Read More

XDR means so much more than some may realize

XDR means so much more than some may realize

Extended Detection and Response (XDR) is an emerging security category with a lot of hype, and a lot of differing opinions on what outcomes it will deliver. New market categories emerge when there are inherent, unmet needs, which cannot be achieved with the existing technology or toolsets. At Cisco, we believe XDR must solve real-world problems in the SOC, many of which have plagued teams for decades. It’s a new category and a new acronym…

Read More

Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR

Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR

In the intricate dance between cyber attackers and defenders, understanding adversary behavior is the difference between keeping up with sophisticated attacks or falling behind the evolving threat landscape. For security teams, this often feels like trying to navigate a maze blindfolded since adversaries typically have greater insights into defender strategies than defenders have into adversarial attacks. This lack of visibility can lead to reactive cybersecurity with ineffective security operations, poor incident response, and a weak…

Read More

Accessing Secure Client Cloud Management after the SecureX EoL

Accessing Secure Client Cloud Management after the SecureX EoL

With the SecureX End of Life (EoL) quickly approaching on July 31, 2024, we want to ensure you have accurate information on how you will be able to continue accessing Cisco Secure Client Cloud Management capabilities. Client Management capabilities are not going away as part of the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service. Cisco Secure Client is our security endpoint agent which contains many capabilities you may…

Read More

Empowering Cybersecurity with AI: The Future of Cisco XDR

Empowering Cybersecurity with AI: The Future of Cisco XDR

In 2007, there was a study from the University of Maryland proving that internet-connected systems were attacked every 39 seconds on average. Today, that number has grown more than 60%. Cisco sees 64 attempts to connect to ransomware infrastructure every second. The world is becoming digitized, and hybrid, which creates an environment that criminals target with increasing sophistication. It’s too much for human-scale, and so a hybrid world requires a hybrid approach that sits between…

Read More

Microsoft’s Security Copilot Enters General Availability

Microsoft’s Security Copilot Enters General Availability

Microsoft Security Copilot, also referred to as Copilot for Security, will be in general availability starting April 1, the company announced today. Microsoft revealed that pricing for Security Copilot will start at $4/hr, calculated based on usage. At a press briefing on March 7 at the Microsoft Experience Center in New York (Figure A), we saw how Microsoft positions Security Copilot as a way for security personnel to get real-time assistance with their work and…

Read More

To win against cyber attackers at Super Bowl LVIII, the NFL turns to Cisco XDR

To win against cyber attackers at Super Bowl LVIII, the NFL turns to Cisco XDR

On Sunday, February 11, over 160 million viewers from around the globe watched Super Bowl LVIII, making it one of the most viewed annual sporting events. It is also a good bet that a record number of bad actors were focused on the contest, not for The Big Game itself, but rather for the goal of implementing a successful cyberattack. A report by the National Cyber Security Centre, The Cyber Threats to Sports Organisations, stated…

Read More
1 2 3 5