Security Bulletin
6 Feb 2026
Biztonsági szemle
Lessons Learned from Securing the World’s Largest Cyber Events
Announcing the launch of the Cisco Event SOCs website and the release of our comprehensive Reference Architecture & Operations Guide.
6 Feb 2026
Biztonsági szemle
Sajtószemle – 2026. 6. hét
Megjelent a 2026. 6. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2026.01.30. és 2026.02.05. között kezelt incidensek, valamint az elosztott kormányzati IT biztonsági csapdarendszerből (GovProbe1) származó adatok statisztikai eloszlását is...
6 Feb 2026
Biztonsági szemle
Cisco Deep Network Model: Purpose built intelligence for networking
This blog was written in collaboration with Yuqing Gao, Jian Tan, Fan Bu, Ali Dabir, Hamid Amini, Doosan Jung, Yury Sokolov, Lei Jin, and Derek Engi. LLMs can sound very convincing, but in network operations, sounding right isn’t enough. Network...
6 Feb 2026
Biztonsági szemle
The future was written at Cisco AI Summit
Cisco AI Summit brought together the visionaries, technologists, and leaders shaping the AI economy for one of the most-watched technology events in recent history.
5 Feb 2026
Biztonsági szemle
EnCase Driver Weaponized as EDR Killers Persist
The forensic tool's driver was signed with a digital certificate that expired years ago, but major security gaps allowed Windows to load it.
5 Feb 2026
Biztonsági szemle
Agentic AI Site 'Moltbook' Is Riddled With Security Risks
Someone used AI to build an entire Web platform, which then did something predictable and preventable: It exposed all its data through a publicly accessible API.
5 Feb 2026
Biztonsági szemle
Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful
A disconnect exists between an organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple open source vulnerability frameworks to help security teams quickly assess which are important, based on...
5 Feb 2026
Biztonsági szemle
Partner Profitability Is Changing — Are You Building for Durability?
Stop building for the next transaction and start building for the next decade. Discover how the Cisco 360 Partner Program helps partners unlock a $6.06 revenue multiplier by mastering managed services, customer lifecycle practices, and recurring...
5 Feb 2026
Biztonsági szemle
Cisco Live Amsterdam: Join Us at ‘Leading the AI Revolution’
AI is no longer just a technology—it’s a new lever of national power, competitiveness, and strategic advantage. As governments and organizations grapple with the promise and complexity of AI, q… Read more on Cisco Blogs
5 Feb 2026
Biztonsági szemle
Developing a National Cybersecurity Strategy in the AI Era: A Playbook for Government
Just last year, Rwandan Minister of IT and Innovation Paula Ingabire called on countries to come together to confront cyber threats that are now unfolding at global scale. As she noted, emerging technologies—from AI and robotics to IoT and blockchain...
5 Feb 2026
Biztonsági szemle
Elevating Meraki Operations with Red Hat Ansible Automation Platform
In our previous blog, “Streamline Operations with Cisco Meraki and Red Hat Ansible Automation,” we introduced the powerful integration between Cisco Meraki’s cloud-managed networking and Red Hat… Read more on Cisco Blogs
5 Feb 2026
Biztonsági szemle
Cyber Success Trifecta: Education, Certifications & Experience
Colonel Georgeo Xavier Pulikkathara, CISO at iMerit discusses the importance of fundamentals, continuous learning, and human ingenuity in the face of AI-driven cybersecurity evolution.
Pagination
- Previous page ‹‹
- Page 34
- Next page ››