Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing
On May 3rd, over a million Gmail users granted a fake, but convincing, application full access to their ema...
Most Recent Videos
Cybersecurity Trends in 2019
Our interconnected world makes everyone more susceptible to cyber-attacks. Companies and institutions are constantly working to protect themselves with increasing security measures - you can play a ro
Hello direct internet access; hello risk
Learn how to gain better performance and more security effectiveness for your branch offices from Cisco’s Product Marketing Manager Kevin Rollinson.
Hackers Don’t Take Holidays
With the holidays among us, one can’t help but to think about taking some much needed time off to spend with friends and family. However, hackers don’t really do holidays. In fact, according to the FB
Cisco Umbrella Demo: First Line of Defense Against Threats
Cisco Umbrella is a cloud-delivered security platform that leverages DNS as the first point of inspection to provide the first line of defense against threats on the internet wherever users go.
How Threat Intelligence Helps You Combat Targeted Malware
As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the
Cisco Umbrella Demo: Rogue Cryptomining in Your Environment?
Watch this video for a dive into the crypto cyber security space, steps you should take to protect your environment, and how Cisco Umbrella combats crypto threats. The days of ransomware payments bei
Cisco Umbrella Demo: App Visibility and Blocking for Shadow IT
See how Umbrella App Discovery and Blocking capabilities can reveal the cloud apps being used, provide usage levels and risk insight and help you control the use of SaaS apps in your organization.
Coffee Hour with Lewisville Independent School District and Cisco
Grab a cup of coffee and tune in to hear Chris Langford, Director of Network, Infrastructure and Cyber Security at Lewisville ISD explain how Cisco Umbrella and Cisco Firepower NGFW enabled him to eas
Office 365 and Email Security Webinar
Watch this webcast to find out how Cisco can help you use SaaS applications safely and protect your cloud email from phishing, ransomware, spoofing, and more while safeguarding sensitive data with dat
Rethinking cybersecurity in the age of attacks
2019 is around the corner. Our existing cybersecurity environment demands a new way to think about our cybersecurity strategy, one that aligns our security investments with our business risks, and is
Managing Shadow IT
Unauthorized IT applications create risk in multiple ways, potentially leading to compromised user identities, data loss through unknown channels, and the introduction of malware into customer environ
Off-Network: The New Security Normal
In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated.
Cryptomining: The next malware attack
Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resou
Ransomware and Other Emerging Threats Within Healthcare Organizations
The healthcare sector has been significantly impacted by ransomware in the last five years. HIMSS explains more in this webcast.
Cisco Stealthwatch Webinar
Join us to hear from Cisco cloud security expert, as he discusses best practices for securing your multi-cloud environment with Cisco Stealthwatch Cloud. Topics include: - Avoiding pitfalls of mig
Back to School Cybersecurity Checklist
During this webinar you will learn how to know if you are experiencing a targeted attack, view unsanctioned cloud services and gain a better understanding of your internet activity across all devices.
WEBINAR Inside App Discovery with Doni Brass
Once Upon A Network Webinar
We don’t think having the best security for your users, data and apps should have to be a fairy tale. If you’re looking for speed, reliability and the best threat intelligence to see and stop attacks
The Latest Threat to your Endpoint Security: Cryptojacking
In this panel discussion, independent information security consultant and author of Hacking For Dummies, Kevin Beaver and consultant and Virtual CIO Andrew Baker will discuss cryptojacking.
We pass the costs to you! An analysis of cryptomining and cryptojacking