What is a threat hunter?

The evolution of ransomware, cyber extortion and cybercriminal cartels

What does a cyber incident really look like?

Recently, members of the Cisco team sat with their cybersecurity experts within Cisco Talos to discuss ransomware, threat hunting and combatting adversaries in a real live fire incident involving a Maze ransomware attack.

In this video, they explore the evolution of ransomware, cyber extortion and cybercriminal cartels. They explore the unfolding of an incident and the countermeasures that can enable an organization to stay resilient during an attack.

Drive your business to think bigger - watch this video to understand more about how Cisco solutions enable small businesses.

Related Articles
Network Infrastructure Are you wired for digital demands?
Are you wired for digital demands?

The challenges of today's environment - and how to solve them.

Cyber Security If it's connected, it needs to be protected
If it's connected, it needs to be protected

How Cisco Secure Freeze helps your business.

Advanced Solutions What is digital transformation for small business?
Advanced Solutions SMBs are being targeted
SMBs are being targeted

Protect your business with the strongest security team on the planet

Advanced Solutions Detection and Response For Dummies
Detection and Response For Dummies

How a platform approach can reduce security complexity

Network Infrastructure Cisco Small Business IT Solutions
Cisco Small Business IT Solutions

Find out how small businesses can think big

Network Infrastructure Cisco hybrid working solutions
Cisco hybrid working solutions

See how Cisco is enabling modern working

Network Infrastructure Protect your business with Cisco cyber security solutions
Network Infrastructure Power hybrid work experiences with Cisco solutions
Power hybrid work experiences with Cisco solutions

Download the eBook to find out more

Share this story

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch