February 4, 2022

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

On the heels of President Biden’s Executive Order on Cybersecurity (EO 14028), the Office of Management and Budget (OMB) has released a memorandum addressing the heads […]
February 4, 2022

How Exploit Intel Makes You Less Vulnerable

New research shows effective and efficient vulnerability management hinges on a key ingredient: exploit intel. The data arrives just in time. An expanding threat landscape In […]
February 4, 2022

Defending Against Critical Threats: Analyzing Key Trends, Part 1

Earlier this year we held a live broadcast, featuring cybersecurity threat analysts from across Cisco Secure. We discussed the most significant cyber threats of 2021, what […]
January 26, 2022

How Well-integrated Tech Can Boost Your Organization’s Security

When Cisco created the first Security Outcomes Study earlier this year, five key practices emerged as being most critical to successful security programs. But why are […]