blogs.cisco.com Open in urlscan Pro
2600:1901:0:8658::  Public Scan

URL: https://blogs.cisco.com/security/accessing-secure-client-cloud-management-after-the-securex-eol__
Submission: On July 29 via manual — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to content



404


OOPS! IT LOOKS LIKE THE PAGE YOU ARE LOOKING FOR CANNOT BE FOUND.


WHILE YOU'RE LOST, PLEASE TAKE YOUR TIME AND EXPLORE THESE AWESOME POSTS...


OR, RETURN TO BLOGS HOME



July 23, 2024



SECURITY



Jennifer Golden

USER PROTECTION SUITE SECURES AGAINST TALOS TOP RANSOMWARE ATTACK TRENDS

3 min read

Discover Talo’s first episode of Talos Threat Perspective and how Cisco’s User
Protection Suite can provide a layered approach to security.

Tags

 * Cisco Talos
 * cisco user protection
 * cyber threats



July 18, 2024

2

SECURITY



Omar Santos

INTRODUCING THE COALITION FOR SECURE AI (COSAI)

2 min read

Announcing the launch of the Coalition for Secure AI (CoSAI) to help securely
build, deploy, and operate AI systems to mitigate AI-specific security risks.

Tags

 * #Security
 * AI for Security
 * Artificial Intelligence (AI)
 * security



July 17, 2024



SECURITY



Gagandeep Singh

ACCELERATING SAAS SOLUTION DELIVERY TO THE U.S. FEDERAL GOVERNMENT

4 min read

The Federal Operational Security Stack is a centralized framework offering
efficiencies when deploying SaaS solutions and services to the U.S. Federal
market.

Tags

 * certification
 * compliance
 * Fed Ops Stack
 * federal government
 * operations
 * SaaS
 * security



July 16, 2024



SECURITY



Jorge Quintero

PROTECTING AGAINST REGRESSHION WITH SECURE WORKLOAD

3 min read

The regreSSHion vulnerability has taken the internet by storm. Learn how Secure
Workload can protect your organization from this and other vulnerabilities.

Tags

 * Secure Workload
 * vulnerability



June 28, 2024

1

SECURITY



Jennifer Golden

STOPPING SUPPLY CHAIN ATTACKS WITH CISCO’S USER PROTECTION SUITE

3 min read

Learn about how Cisco’s User Protection Suite can stop supply chain attacks and
protect users.

Tags

 * cisco user protection
 * cyber attack
 * Featured
 * secure supply chain
 * user security



June 26, 2024



SECURITY



Dr. Giannis Tziakouris

DIGITAL FORENSICS FOR INVESTIGATING THE METAVERSE

20 min read

Exploring the Metaverse? Discover its hidden cybersecurity risks and stay
protected. Dive into the evolving world of virtual reality with us, where we
uncover and tackle the security challenges of tomorrow

Tags

 * Blockchain Analytics
 * Cybersecurity
 * Featured
 * Metaverse
 * Virtual Reality Forensics



CONNECT WITH US

 * 
 * 
 * 
 * 
 * 

Cookies allow us to optimise your use of our website. We also use third-party
cookies for advertising and analytics. Please read our Privacy Statement and
Cookie Notice for more information.
Manage cookie settings Reject Accept



CONSENT MANAGER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * TARGETING COOKIES


 * FUNCTIONAL COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. From the list on
left, please choose whether this site may use Performance and/or Targeting
Cookies. By selecting Strictly Necessary Cookies only, you are requesting Cisco
not to sell or share your personal data. Note, blocking some types of cookies
may impact your experience on the site and the services we are able to offer.
Privacy Statement

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


These cookies provide metrics related to the performance and usability of our
site. They are primarily focused on gathering information about how you interact
with our site, including: page load times, response times, error messages, and
allowing a replay of a visitor’s interactions with our site, which enables us to
review and analyze visitor behavior, helping to improve site usability and
functionality. These cookies also allow us to count visits and traffic sources
so we can measure and improve the performance of our site. They help us to know
which pages are the most and least popular and see how visitors move around the
site. If you do not allow these cookies we will not know when you have visited
our site and will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Save Settings
Allow All