Unified Threat Enforcement

  • Week 3: Hypothesis Based Threat Hunting and MITRE44:32

    Week 3: Hypothesis Based Threat Hunting and MITRE

    Security analysts consume and process thousands of threat intelligence indicators every day. The vast majority of these are simple atomic or computed indicators such as IPs, domain names, file hashes,

    Watch Video
  • 7 Ways to Take Cybersecurity to New Levels

    7 Ways to Take Cybersecurity to New Levels

    Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 7 ways to amplify and extend your stack with Cisco Umbrella cloud security.

    Read PDF
  • Building an Incident Readiness and Response Playbook1:01:08

    Building an Incident Readiness and Response Playbook

    Don't make a data breach any harder than it needs to be. We’ll walk you through the Xs and Os of any good security incident readiness and response playbook. View webcast now.

    Watch Video
  • Webinar: Is Your Cybersecurity on the Naughty List (Again)?1:01:06

    Webinar: Is Your Cybersecurity on the Naughty List (Again)?

    In this webcast, view now to learn from cybersecurity expert Duncan McAlynn on how to protect and defend your organization against menacing attacks in 2020.

    Watch Video
  • Threat Spotlight: Emotet9:01

    Threat Spotlight: Emotet

    It’s been five years since the discovery of Emotet yet it’s still making a buzz. Join us for a short history and evolution of the Emotet malware based on our own investigation.

    Watch Video
  • How Cryptocurrency is Changing Cyber Security6:42

    How Cryptocurrency is Changing Cyber Security

    With the rocketing crypto market cap soaring up to $835 billion at its peak — the name of the game is computing power. Is your environment safe?

    Watch Video
  • Trend Report: Threats are Multiplying and Becoming More Sophisticated

    Trend Report: Threats are Multiplying and Becoming More Sophisticated

    Trend Report: Threats are Multiplying and Becoming More Sophisticated

    Read PDF
  • Another Day, Another Data Breach1:08:32

    Another Day, Another Data Breach

    By now you have probably heard the importance of investing in security. You may have some concerns surrounding Ransomware threats or unauthorized bitcoin mining using your precious network resources.

    Watch Video
  • Stop threats quickly by integrating your Cisco Security products 20190411 1703 143:53

    Stop threats quickly by integrating your Cisco Security products 20190411 1703 1

    Learn how to sharpen your threat hunting expertise with Cisco Threat Response. Join our webinar to: • Sharpen your threat hunting expertise using Umbrella, AMP, Email Security, Threat Grid, and Cisco

    Watch Video
  • AI and cybersecurity: Is AI the solution to cyber attack risks?36:05

    AI and cybersecurity: Is AI the solution to cyber attack risks?

    AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go

    Watch Video
  • Threat Landscape - How to predict, spot and mitigate threats35:17

    Threat Landscape - How to predict, spot and mitigate threats

    We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integra

    Watch Video
  • Bust Threats or Risk Getting Busted30:46

    Bust Threats or Risk Getting Busted

    Learn the latest trends on top threats and best practices you can use to protect against threats in your organization. Find out what techniques, tricks and tips Cisco researchers use to uncover and i

    Watch Video
  • Cracking down on cryptocurrency24:27

    Cracking down on cryptocurrency

    The birth of cryptocurrency has changed the threat landscape making it easier for malicious actors to get paid and remain anonymous. While the days of ransomware being paid in cryptocurrency is far fr

    Watch Video
  • Defending Your Network from Cryptomining

    Defending Your Network from Cryptomining

    Learn how to defend your organization from illicit cryptomining with the Cisco security portfolio.

    Read PDF
  • Umbrella for MSPs - Predictive Intelligence

    Umbrella for MSPs - Predictive Intelligence

    Read PDF
  • Cisco Umbrella: Maximum threat protection for the NHS

    Cisco Umbrella: Maximum threat protection for the NHS

    Read PDF
  • Improve threat detection through automation and orchestration55:28

    Improve threat detection through automation and orchestration

    Threat detection is an inherently difficult practice due to cunning adversaries and evolving attack methods.

    Watch Video
  • Cisco Umbrella - Ransomware Webinar 201842:50

    Cisco Umbrella - Ransomware Webinar 2018

    Imagine losing access to all of your data, only to find out you are being extorted by criminals who require payment to get it back. These attacks have affected every industry – and there is a flurry o

    Watch Video
  • loading
    Loading More...