The rise of ransomware continues with attacks doubling in 2019. Sure cryptomining and Emotet took a lot of the spotlight in 2018 – but ransomware remains a resilient, lucrative form of attack that races to the top of attack vectors for 2019. And it shows no signs of slowing as security professionals get their budgets ready for 2020. Ransomware continues to evolve at an alarming rate with more sophisticated variants and hackers modifying attack methods for more even bigger payouts. Are you at risk? See why ransomware still remains an unfortunately reality for organizations of all sizes, and all industries.
Turn Shadow IT risks into insights
It’s time for better visibility into sanctioned and unsanctioned cloud services across your enterprise. Now...
Most Recent Videos
Building an Incident Readiness and Response Playbook
Don't make a data breach any harder than it needs to be. We’ll walk you through the Xs and Os of any good security incident readiness and response playbook. View webcast now.
How to Leverage DNS to Get Your Security Program Under Control
A well-run information security program requires not only great visibility but also the necessary control. Security around DNS is often the weak link. Whether it’s an automated computer transaction or
Why ransomware remains resilient in 2020 - and what to do about it!
Did you know that ransomware is one of THE top concerns keeping CEOs up at night in 2020?
Threat intelligence: The New Driver for Incident Response
Find out how you can shorten your response time and garner the information you need to be effective in one central place. We’ll explain the steps you can take to detect and investigate threats faster.
Webinar: Is Your Cybersecurity on the Naughty List (Again)?
In this webcast, view now to learn from cybersecurity expert Duncan McAlynn on how to protect and defend your organization against menacing attacks in 2020.
Punycode: Awareness and Protection
This session covers the importance of DNS, a critical component of the Internet and how it's used to identify malicious domains.
Abracadabra of Malwares: Obfuscation
This webinar focuses on how obfuscation is used in malwares, types of obfuscation and how new age malwares carry obfuscated content that delays reversing process.
How Cryptocurrency is Changing Cyber Security
With the rocketing crypto market cap soaring up to $835 billion at its peak — the name of the game is computing power. Is your environment safe?
Threat Spotlight: Emotet
It’s been five years since the discovery of Emotet yet it’s still making a buzz. Join us for a short history and evolution of the Emotet malware based on our own investigation.
Manage security breaches in real-time with Cisco
In this webinar, we will show you how to build a strong security posture and integrated defence system that will allow you to quickly respond to breaches.
Turn Shadow IT risks into insights
It’s time for better visibility into sanctioned and unsanctioned cloud services across your enterprise. Now more than ever you need to be able to see what’s happening at every level of your organisati
Gearing Up for 2020: Best Practices to Secure Your Remote Workers
Today’s workplaces are changing. More organizations are switching to direct internet access (DIA) at satellite offices. Watch webcast to discover a better way to see and control all internet traffic.
Cisco Umbrella & Stealthwatch: Ensure your journey through the cloud is compliant
This webinar highlights how Cisco Umbrella & Stealthwatch can help you easily monitor your organisation for threats and maintain compliance with industry regulations.
Ransomware Trends to Prevent in 2020
Ransomware is a threat for businesses large and small. Learn practical tips on how to prevent trending threats in 2020.
Are You a Target? New Research on Threats
What separates attack targets from attack victims? The answer is simple: proactive threat intelligence. With emerging threats like Emotet, pervasive phishing, and relentless ransomware attacks on ris
Bust threats or risk getting busted
Find out what techniques, tricks and tips Cisco researchers use to uncover and identify threats like malicious cryptomining, phishing and ransomware attacks.
Your New Best Friend: DNS Security
Brush up on DNS security fundamentals, learn how DNS-layer security can help you block threats before they reach your users, and gain visibility into what’s really happening on your network.
Getting the best out of the cloud with Cisco Umbrella & DUO
The power of Cisco Umbrella & DUO, combined. In this recorded webinar, you will learn how you can secure access to the internet and protect the usage of cloud apps with Cisco Umbrella and DUO Security
Sacrifice is a good little trick: Defeating Evasive Malware
In this Cyberworld the perfect phrase to describe malware hunting is “Catch me if you can". Confinement of a malware, running it in a sandbox and studying malware has become a frequent practice. The
What’s new with Cisco Umbrella?