Most Recent Articles
Miners in the Shadows: Extracting Treasure with Stolen Resources
Malicious cryptomining lets cybercriminals profit at your organization’s expense. Find out who they’re targeting and how to protect your network.
We Are Better
People make a lot of claims about network security. We’d rather show you proof. Cisco Umbrella delivers 100% reliability worldwide and we’ve been doing it for 12 years.
3 Red Flags You're Not Getting the Security You Were Promised
Some solutions promise to check all the boxes on network security. But it turns out, they're checking all the wrong ones.
Six Degrees of Network Security
There are a number of obstacles standing between you and safe network. Your security shouldn't be one of them.
This is a story about Cisco Meraki MR and Cisco Umbrella (and Bob).
Here are 5 things Bob can do by adding a layer of cloud-delivered protection with Cisco Umbrella - and you can, too!
Are you getting what you were promised?
Are you getting what you were promised? People make a lot of claims about network security. We’d rather show you proof.
Ransomware: An epidemic for the healthcare industry
Get the facts on ransomware attacks targeting the healthcare industry — how they work, your first line of defense against them, and how to protect data systems for PII and PHI.
Five reasons for the rise of the secure internet gateway
Investigate attacks like never before
Attackers are pivoting through your infrastructure. What if you could pivot through theirs?
Small Business is BIG business for hackers
MSPs are up against cybercriminals that have adopted a standard, modern business model. And it's paying off.
Cisco Umbrella / CDW – Defending the Healthcare Perimeter
Keep your school district safe from hackers and ransomware
Don't Risk It. Higher education cybersecurity 101
Ransomware Defense Checklist
Use this checklist to ensure you have everything covered to prevent a future ransomware attack.
Investigate Use Case
Sample work flow using Investigate during incident response
A Network Manager's Guide to Ransomware
See how ransomware works and explore how to build your own defense strategy.
Network Access Gone Rogue
Gain insights into managing your roaming end-users.
How Cisco Umbrella Stays Ahead of Attacks