What is Cloud Security?
Lorraine Bellon
• 3 minute read
View blog >
This blog explains what cloud security is, how it is different from other types of cybersecurity, and how Cisco Umbrella delivers cloud security.
Lorraine Bellon
• 3 minute read
View blog >
This blog explains what cloud security is, how it is different from other types of cybersecurity, and how Cisco Umbrella delivers cloud security.
Lorraine Bellon
• 8 minute read
View blog >
In this blog post, Cisco Umbrella defines the key cybersecurity terms and threats that everyone should know in 2020 and beyond.
Rachel Ackerly
• 3 minute read
View blog >
The 2nd Edition Ransomware Defense For Dummies eBook is freshly revised with the latest trends and techniques for stopping ransomware attacks in 2020 & beyond
Lorraine Bellon
• 3 minute read
View blog >
To help strengthen your organization’s cyber security practices, here is our list of top 10 cybersecurity tips for anyone on the Internet (hint: that's you)
Kate MacLean
• 3 minute read
View blog >
Find out how Gartner defines the Secure Access Service Edge (SASE), and what steps they recommend for security and risk management leaders to manage change.
Negisa Taymourian
• 2 minute read
View blog >
On November 9th, the Cisco Umbrella teamed up to host interactive cybersecurity workshops at the World Wide Women Girls' Festival in San Francisco.
Kate MacLean
• 3 minute read
View blog >
Businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices. Find out what's up in Europe.
Negisa Taymourian
• 3 minute read
View blog >
Phishing Phishers usually masquerade as a trustworthy entity in an electronic communication. That’s probably why it accounts for 90% of data breaches.
Rachel Ackerly
• 3 minute read
View blog >
53% of midmarket businesses have experienced a security breach — yet midmarket companies investigate only 55.6% of security alerts - read more in this blog.
Rachel Ackerly
• 2 minute read
View blog >
DoH (DNS-over-HTTPS) can increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks.