Cisco Hypershield: Reimagining Security
Cisco Blog » Security
by Craig Connors
1d ago
It is no secret that cybersecurity defenders struggle to keep up with the volume and craftiness of current-day cyber-attacks. A significant reason for the struggle is that security infrastructure has… Read more on Cisco Blogs ..read more
Visit website
Supercharging Cisco XDR with AI and Identity Intelligence at RSAC 2024
Cisco Blog » Security
by Teresa Brunner
2d ago
Cisco XDR is a leader in providing comprehensive threat detection and response across the entire attack surface. We’ll be showcasing new capabilities that will give security teams even more insight, a… Read more on Cisco Blogs ..read more
Visit website
Synergizing Advanced Identity Threat Detection & Response Solutions
Cisco Blog » Security
by Jeff Yeo
3d ago
In an ever-evolving digital landscape, cybersecurity has become the cornerstone of organizational success. With the proliferation of sophisticated cyber threats, businesses must adopt a multi-layered… Read more on Cisco Blogs ..read more
Visit website
Cisco Telemetry Broker (CTB) 2.1 Launch
Cisco Blog » Security
by Rob Ayoub
3d ago
The ability to generate NetFlow from devices that do not natively produce it along with significant storage efficiency and improved workflows make for a significant update to CTB. Cisco Telemetry… Read more on Cisco Blogs ..read more
Visit website
Cisco Secure Access Wins Global Security Service Edge Customer Value Leadership Award
Cisco Blog » Security
by David Gormley
1w ago
It’s one thing to claim leadership in cloud security; it’s another to have that leadership acknowledged by industry experts. That’s why we’re thrilled to announce our recent recognition by Frost & Sul… Read more on Cisco Blogs ..read more
Visit website
Defusing the threat of compromised credentials
Cisco Blog » Security
by Ben Nahorney
1w ago
Let’s say that, during the middle of a busy day, you receive what looks like a work-related email with a QR code. The email claims to come from a coworker, requesting your help in reviewing a d… Read more on Cisco Blogs ..read more
Visit website
Cryptocurrency and Blockchain security due diligence: A guide to hedge risk
Cisco Blog » Security
by Dr. Giannis Tziakouris
2w ago
Blockchain technology has experienced remarkable adoption in recent years, driven by its use across a broad spectrum of institutions, governments, retail investors, and users. However, this surge in… Read more on Cisco Blogs ..read more
Visit website
Cisco and Nvidia: Redefining Workload Security
Cisco Blog » Security
by Jana Radhakrishnan
1M ago
There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access… Read more on Cisco Blogs ..read more
Visit website
Cisco Secure Access named Leader in Zero Trust Network Access
Cisco Blog » Security
by Andrew Akers
1M ago
Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today’s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust a… Read more on Cisco Blogs ..read more
Visit website
Sign up for a Tour at the RSA Conference 2024 SOC
Cisco Blog » Security
by Jessica Bair
1M ago
Join the guided tour outside the Security Operations Center, where we’ll discuss real time network traffic of the RSA Conference, as seen in the NetWitness platform. Engineers will be using Cisco S… Read more on Cisco Blogs ..read more
Visit website

Follow Cisco Blog » Security on FeedSpot

Continue with Google
Continue with Apple
OR