Newsroom

Partner Alert: September 2 Price Changes

On September 2nd, 2023, Cisco will implement price changes for products & services. The price changes are due to one or more of the following reasons: changing market conditions, price corrections, configuration changes, or competitive market change. Please visit your regional Cisco.com Price Announcements Page for the complete list of affected PIDs.

What Does the Patchless Cisco Vulnerability Mean for IT Teams, CIOs?

On July 5, Cisco released a security advisory warning users of a “vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode.” The networking and cybersecurity solutions company has no plans to release software updates to address the vulnerability, and there are no workarounds. IT teams are now faced with responding to a patchless vulnerability.

Security Partner Roadmap Series: Kenna, July 25 9-10AM PST

Join the Vulnerability Management Product Marketing team to learn about the recent and future innovations and how Vulnerability Management is being woven into the Cisco Secure portfolio. To register, https://xpert.cisco.com/register/TC-009511

The impact of AI and multi-cloud on cybersecurity with Tom Gillis, Cisco

According to Tom Gillis, SVP & General Manager, Security Business Group at Cisco, most large enterprises now utilize dozens of different tools in their security toolchain, which is extremely problematic when you bring multi- and hybrid-cloud into the mix. As the frequency and severity of attacks continue to increase in this environment, Gillis speaks with VentureBeat’s Senior Technology Contributor, Tom Langford, about how multi-domain telemetry empowered by AI will be the future of security, providing better defenses in our rapidly changing world of tech.

Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor

Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level. Cisco Talos discovered a new Microsoft Windows policy loophole that allows a threat actor to sign malicious kernel-mode drivers executed by the operating system. The threat actor takes advantage of a specific compatibility policy from Microsoft to enable the signing of malicious kernel-mode drivers. Then, the RedDriver malware, which might be developed by a Chinese-speaking threat actor, targets browsers used primarily in China.

Previous / Next

Current Programs and Offers

View All