blogs.cisco.com
Open in
urlscan Pro
2600:1901:0:8658::
Public Scan
URL:
https://blogs.cisco.com/security/accessing-secure-client-cloud-management-after-the-securex-eol__
Submission: On July 29 via manual — Scanned from DE
Submission: On July 29 via manual — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to content 404 OOPS! IT LOOKS LIKE THE PAGE YOU ARE LOOKING FOR CANNOT BE FOUND. WHILE YOU'RE LOST, PLEASE TAKE YOUR TIME AND EXPLORE THESE AWESOME POSTS... OR, RETURN TO BLOGS HOME July 23, 2024 SECURITY Jennifer Golden USER PROTECTION SUITE SECURES AGAINST TALOS TOP RANSOMWARE ATTACK TRENDS 3 min read Discover Talo’s first episode of Talos Threat Perspective and how Cisco’s User Protection Suite can provide a layered approach to security. Tags * Cisco Talos * cisco user protection * cyber threats July 18, 2024 2 SECURITY Omar Santos INTRODUCING THE COALITION FOR SECURE AI (COSAI) 2 min read Announcing the launch of the Coalition for Secure AI (CoSAI) to help securely build, deploy, and operate AI systems to mitigate AI-specific security risks. Tags * #Security * AI for Security * Artificial Intelligence (AI) * security July 17, 2024 SECURITY Gagandeep Singh ACCELERATING SAAS SOLUTION DELIVERY TO THE U.S. FEDERAL GOVERNMENT 4 min read The Federal Operational Security Stack is a centralized framework offering efficiencies when deploying SaaS solutions and services to the U.S. Federal market. Tags * certification * compliance * Fed Ops Stack * federal government * operations * SaaS * security July 16, 2024 SECURITY Jorge Quintero PROTECTING AGAINST REGRESSHION WITH SECURE WORKLOAD 3 min read The regreSSHion vulnerability has taken the internet by storm. Learn how Secure Workload can protect your organization from this and other vulnerabilities. Tags * Secure Workload * vulnerability June 28, 2024 1 SECURITY Jennifer Golden STOPPING SUPPLY CHAIN ATTACKS WITH CISCO’S USER PROTECTION SUITE 3 min read Learn about how Cisco’s User Protection Suite can stop supply chain attacks and protect users. Tags * cisco user protection * cyber attack * Featured * secure supply chain * user security June 26, 2024 SECURITY Dr. Giannis Tziakouris DIGITAL FORENSICS FOR INVESTIGATING THE METAVERSE 20 min read Exploring the Metaverse? Discover its hidden cybersecurity risks and stay protected. Dive into the evolving world of virtual reality with us, where we uncover and tackle the security challenges of tomorrow Tags * Blockchain Analytics * Cybersecurity * Featured * Metaverse * Virtual Reality Forensics CONNECT WITH US * * * * * Cookies allow us to optimise your use of our website. We also use third-party cookies for advertising and analytics. Please read our Privacy Statement and Cookie Notice for more information. Manage cookie settings Reject Accept CONSENT MANAGER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES * FUNCTIONAL COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. From the list on left, please choose whether this site may use Performance and/or Targeting Cookies. By selecting Strictly Necessary Cookies only, you are requesting Cisco not to sell or share your personal data. Note, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Privacy Statement STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies provide metrics related to the performance and usability of our site. They are primarily focused on gathering information about how you interact with our site, including: page load times, response times, error messages, and allowing a replay of a visitor’s interactions with our site, which enables us to review and analyze visitor behavior, helping to improve site usability and functionality. These cookies also allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Save Settings Allow All