Category: Uncategorized

  • Geopolitics Is Shaping Generative AI (and Vice Versa)

    Geopolitics Is Shaping Generative AI (and Vice Versa) Country-specific ideologies are shaping AI regulations in each jurisdiction, leading to the likely scenario of technological decoupling. This research helps prepare executive leaders to use GenAI tools as a platform to create business value when adopting these tools across different jurisdictions. Download Now Copyright © 2025 Cisco

  • Dancing with Threats: Staying Nimble with Secure Access

    Dancing with Threats: Staying Nimble with Secure Access Speakers: Wendy Nather – Director of Strategic Engagements, Cisco & Ben Nahorney – Threat Intelligence Analyst, Cisco Security The security controls you choose for your organization need to both meet your unique requirements and keep up with both old and new threats. Threats are dynamic; attackers can…

  • How Identity-First SSE Drives Zero Trust Success

    How Identity-First SSE Drives Zero Trust Success Speakers: Jeff Scheaffer – VP, Product Management Zero Trust and ZTNA. Few doubt its enormous potential to tighten cybersecurity. Yet, zero trust deployments are stalling. You can shift that trajectory for your organization with Zero Trust Access by Cisco. This webinar will highlight how Cisco gave the familiar…

  • Redefining Universal ZTNA: Securing the Future-proof Workplace

    Redefining Universal ZTNA: Securing the Future-proof Workplace Discover how Cisco is redefining zero trust with our innovative Universal Zero Trust Network Access (ZTNA) solution. Our eBook provides an in-depth exploration of how Cisco’s unique approach ensures secure, seamless, and efficient access for all users, across any location, application, or device. Download Now Copyright © 2025…

  • Security Service Edge Competitive Assessment

    Security Service Edge Competitive Assessment Evaluating ZTNA and SSE solutions? Get Miercom’s 2024 SSE Report and see for yourself the Cisco Secure Access advantage. Cisco received top results across multiple threat efficacy categories. Plus, Miercom identified manageability and performance differentiators that make Cisco better for users and better for IT. Download Now Copyright © 2025…

  • Leapfrog ZTNA to Zero Trust Access for All Apps

    Leapfrog ZTNA to Zero Trust Access for All Apps The new paradigm of hybrid work, accelerated cloud adoption, and the shift to direct internet access have revealed the limitations of legacy perimeter security models. Organizations need a new approach to provide high performant, secure remote access to their full portfolio of private applications. We will…

  • GigaOm Radar for DNS Security

    GigaOm Radar for DNS Security DNS is at the heart of every internet connection request, which makes securing it crucial to stronger user security. Securing the DNS layer means blocking malicious domains and IP addresses before a remote connection is ever established. This new GigaOm Radar analyst report examines 11 of the top DNS security…

  • SANS Webinar: Securely Moving to the (Government) Cloud

    SANS Webinar: Securely Moving to the (Government) Cloud Hear from SANS Analyst Matt Bromiley and Christian Clasen, Technical Marketing Engineer from Cisco, as they discuss federal agencies and their transition to cloud-based resources. They will review key rules and regulations that agencies should be aware of, how to plan and deal with the “new normal”…

  • SANS Whitepaper: Securely Moving to the (Government) Cloud

    SANS Whitepaper: Securely Moving to the (Government) Cloud The cloud has changed infrastructure for federal, state, and local government agencies. There are many regulatory requirements and considerations to navigate, and a secure implementation requires careful planning. This SANS whitepaper reviews key regulations that agencies should be aware of to securely enable a cloud-first transition. Download…

  • Cisco Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

    Cisco Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette You can’t protect against what you can’t see. Cisco resolves billions of DNS requests every day and with every connection to website or application, we gain insight into threats being staged all over the internet. From this data, we can see how bad actors…