In this Cyberworld the perfect phrase to describe malware hunting is “Catch me if you can". Confinement of a malware, running it in a sandbox and studying malware has become a frequent practice. The malware author has burst the bubble. This author evades sandboxes by exhibiting a different behavior, staying quiet, and understanding how sandboxes operate. Learn how modern-day malwares stay silent, evade and exhibit different behavior. Discover how we developed a kit called “ Friday” to learn, deceive, defeat and capture behaviors of some of the modern day evasive malwares.
Most Recent Videos
What’s new with Cisco Umbrella?
Listen in to hear everything new and improved with Cisco Umbrella! Learn how you can see and block threats other solutions miss, reduce alerts and gain context into high-priority threats and deploy in
See Protect Users Endpoints Everywhere
Users have adopted the cloud, changing the way we work. Has your security kept up? View this webcast to learn how to your users safe with deep visibility into endpoints, apps, files and locations.
More Reasons to Love your WiFi
It’s time to combine network and security data for insights that not only help you optimize your network’s performance, it keeps it secure.
Back to school cybersecurity checklist
As summer draws to an end, we've got a way for you to get a jump on malware. Find out how a secure internet gateway can help you reduce the time it takes to detect and contain threats.
Meet Your New Best Friend: DNS Security
Brush up on DNS security fundamentals, learn how DNS-layer security can help you block threats before they reach your users, and gain visibility into what’s really happening on your network.
Embrace Direct Internet Access, Easily
Find out how you can address new security challenges and reduce pressure on IT staff with a cloud-delivered secure internet gateway. Better performance and more effective security awaits.
AI and cybersecurity: Is AI the solution to cyber attack risks?
AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go
The Rise of Direct Internet Access and the Impact of Cyberattacks
ESG Security Analyst, Jon Oltsik, and Cisco Product expert, Negisa Taymourian discuss the latest insights on the state of cybersecurity.
Six ways to amplify your security stack
Strengthening your security stack doesn’t have to mean a massive overhaul or a loss of customisation and control. Learn six ways to amplify and extend your stack with cloud security from Cisco Umbrell
A Look into our Secure Internet Gateway
Take a deep dive into all security services provided by Cisco's Umbrella, Cisco's secure internet gateway, and illustrates the benefits enabled by cloud-delivered security with practical examples. P
Six degrees of network security
Learn how to avoid six common security pitfalls that put your users, their devices, and your data at risk.
Designing Security for the Future of Your Network
Learn more about what your peers are experiencing, a new approach to secure roaming users/branch locations, and how Cisco is evolving security to address these challenges in innovative ways.
Reduce Phishing Risk in Minutes with Umbrella and Duo
Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls.
Cloud Delivered Security for K 12
Discover why school boards across Canada choose Cisco Cloud Security to secure the modern classroom, reduce overhead and lower total cost of ownership.
Secure your journey through the cloud
How do you deploy effective security for a multi-cloud world? How do you secure both access to the cloud and usage of it? How do you get greater visibility into those environments and reduce the risk
Cybersecurity Tips for Device & Data Protection: Summertime Edition
Media Webcast: Don't get burned this summer by crafty phishing attempts, rogue WiFi hotspots, lost or stolen devices, and varying encryption laws. Watch now.
See and Protect Users and Endpoints Everywhere
Find out how you can strengthen your security posture and protect your users and devices, everywhere they access the internet.
3 Easy Ways to Secure Your K-12 School District
Learn three simple ways to secure your school district, and save time and money!
Secure Mobile Users Anywhere - The Best Protection for iOS Devices
Secure Mobile Users Anywhere. Apple and Cisco are accelerating digital transformation, and providing a truly unique level of visibility and control on supervised iOS devices. The Cisco Security Con
Turn Shadow IT Risks into Insights