Empowering Cybersecurity with AI: The Future of Cisco XDR

Empowering Cybersecurity with AI: The Future of Cisco XDR

In 2007, there was a study from the University of Maryland proving that internet-connected systems were attacked every 39 seconds on average. Today, that number has grown more than 60%. Cisco sees 64 attempts to connect to ransomware infrastructure every second. The world is becoming digitized, and hybrid, which creates an environment that criminals target with increasing sophistication. It’s too much for human-scale, and so a hybrid world requires a hybrid approach that sits between…

Read More

Microsoft’s Security Copilot Enters General Availability

Microsoft’s Security Copilot Enters General Availability

Microsoft Security Copilot, also referred to as Copilot for Security, will be in general availability starting April 1, the company announced today. Microsoft revealed that pricing for Security Copilot will start at $4/hr, calculated based on usage. At a press briefing on March 7 at the Microsoft Experience Center in New York (Figure A), we saw how Microsoft positions Security Copilot as a way for security personnel to get real-time assistance with their work and…

Read More

To win against cyber attackers at Super Bowl LVIII, the NFL turns to Cisco XDR

To win against cyber attackers at Super Bowl LVIII, the NFL turns to Cisco XDR

On Sunday, February 11, over 160 million viewers from around the globe watched Super Bowl LVIII, making it one of the most viewed annual sporting events. It is also a good bet that a record number of bad actors were focused on the contest, not for The Big Game itself, but rather for the goal of implementing a successful cyberattack. A report by the National Cyber Security Centre, The Cyber Threats to Sports Organisations, stated…

Read More

Agniane Stealer: Information stealer targeting cryptocurrency users

Agniane Stealer: Information stealer targeting cryptocurrency users

The Agniane Stealer is an information-stealing malware mainly targeting the cryptocurrency wallets of its victims. It gained popularity on the internet starting in August 2023. Recently, we have observed a distinct campaign spreading it across our telemetry. Our recent study has led to the successful identification and detailed analysis of a previously unrecognized network URL pattern. Our researchers have recently uncovered more information on the malware’s methods for file collection and the intricacies of its…

Read More

Report: AI cybersecurity market projected to exceed $133 billion

Report: AI cybersecurity market projected to exceed $133 billion

A report by Techopedia has provided insights into the influence of AI on the cybersecurity industry. Key findings of the report include the projected value of the AI cybersecurity market, the expenses and savings associated with using AI to identify data breaches, and opinions on AI from cybersecurity professionals.  The report estimates that the value of the global AI cybersecurity market is expected to surpass $133 billion from 2023 to 2030. AI has strengthened cybersecurity…

Read More

Cisco XDR: SLEDs “SOC in a Box”

Cisco XDR: SLEDs “SOC in a Box”

For State, Local, and Education (both Higher Ed and K-12) (SLED) entities the Security Operations Center (SOC) is a required tool in the toolbox and a necessity for Cyber Insurance.  Threats to data and information are ever evolving, and better safeguarding the security of SLED entities is a must. The cornerstone of a robust defense is the SOC. In this blog, we’ll explore how Cisco XDR simplifies and enhances the operations of SLED-focused SOCs, helping…

Read More

Introducing Cisco Breach Protection, Delivering Complete Detection and Response of MITRE ATT&CK TTP’s

Introducing Cisco Breach Protection, Delivering Complete Detection and Response of MITRE ATT&CK TTP’s

Security Operations Centers (SOC) are responsible for detecting and responding to potential cyber threats in real-time. With the increasing complexity of cyberattacks, it’s important for SOC teams to have comprehensive coverage of MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) tactics, techniques, and procedures (TTPs). Today we’re discussing the importance of having comprehensive coverage of MITRE ATT&CK TTPs in security operations, and how Cisco technology can help to achieve this goal. Why MITRE ATT&CK TTPs…

Read More

An in-depth look at cyber protection: extended detection and response

An in-depth look at cyber protection: extended detection and response

An in-depth look at cyber protection: extended detection and response | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How banks elevate security in the modern threat landscape

How banks elevate security in the modern threat landscape

How banks elevate security in the modern threat landscape | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

5 minutes with Bob Burke – The importance of advanced MFA technology

5 minutes with Bob Burke – The importance of advanced MFA technology

5 minutes with Bob Burke – The importance of advanced MFA technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More
1 2 3 4