Hunting & Disrupting Cyber-Criminals
Warning. It’s Hunting Season. Hackers don’t wear blaze orange. Sophisticated adversaries are targeting y...
Other content in this Stream
See and Protect Users and Endpoints Everywhere
Find out how you can strengthen your security posture and protect your users and devices, everywhere they access the internet.
3 Easy Ways to Secure Your K-12 School District
Learn three simple ways to secure your school district, and save time and money!
Turn Shadow IT Risks into Insights
Cisco Umbrella: First Line of Defense Against Threats
Cisco Umbrella is a cloud security platform that leverages DNS to provide the first line of defense against threats on the internet wherever users go.
From Chaos to Clarity: New Trends on Securing Roaming Users & Branch Offices
With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users an attractive target for threats, find out how to shift your security, gain control and protect users m
Meraki & Umbrella: A match made in the cloud
What if you could protect every user on your Meraki network in minutes without deploying an additional appliance? That’s the magic of combining the Meraki MR wireless access points and Cisco Umbrella.
Networking and Security - Bury the Hatchet in the Cloud
Learn why joining forces with your networking manager may be the best thing for your security team right now.
Bust Threats or Risk Getting Busted
Learn the latest trends on top threats and best practices you can use to protect against threats in your organization. Find out what techniques, tricks and tips Cisco researchers use to uncover and i
You have been breached, now what?
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a laye
Cracking down on cryptocurrency
The birth of cryptocurrency has changed the threat landscape making it easier for malicious actors to get paid and remain anonymous. While the days of ransomware being paid in cryptocurrency is far fr
2018’s Top Threat Malicious Cryptomining — Now What?
With a 19x increase in crypto-related traffic in the last nine months, there’s never been a better time to find out if computing resources in your organization are being used without your knowledge.
Aplicativos desconectados com riscos descobertos (Risky Connected Apps Uncovered - Portuguese)
Assista ao nosso vídeo destacando o Shadow IT que importa mais do que outros: aplicativos conectados OAuth
Aplicaciones Riesgo Conectadas Descubiertas (Risky Connected Apps Uncovered - Spanish)
Vea nuestro video destacando el Shadow IT que importa más que otros: OAuth apps conectadas
Es Martes, Carl (It's Tuesday, Carl - Spanish)
Vea nuestro video destacando los desafíos que enfrentan las organizaciones cuando se trata de la seguridad en la nube. Watch our video highlighting the challenges that organizations face when it come
É terça-feira, Carl (It's Tuesday, Carl - Portuguese)
Assista ao nosso vídeo destacando os desafios que as organizações enfrentam quando se trata de segurança na nuvem. Watch our video highlighting the challenges that organizations face when it comes to
Dropbox y CloudLock Seguridad Empresarial en la Nube
¿Desea aprender como Dropbox y Cloudlock están cambiando la seguridad en la nube para empresas por toda Latinoamérica? Con la movilización importante en el sector de IT, Dropbox y CloudLock (Pronto se
Today’s Balancing Act: Security & Flexibility
Watch speaker, Joseph Paradi, Sr. Director ITS Infrastructure at Avanade, discuss how a sound cloud security strategy can help defend against security threats, simplify security and support users.
Cisco Umbrella Live Demo
Learn how Cisco Umbrella can give you the boost you need to secure your apps, data, and users whenever they're on the move.
Cisco Umbrella Coffee Hour with Deutsche Bank
Grab a cup of coffee and tune in to hear Alan Meirzon, Director – Chief Information Security Office at Deutsche Bank share his experience using Cisco Umbrella. Alan discusses how his team uses Umbrell
Cryptomining: The Cyber Gold Mine