<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cisco Umbrella</title>
	<atom:link href="https://umbrella.cisco.com/blog/feed" rel="self" type="application/rss+xml" />
	<link>https://umbrella.cisco.com</link>
	<description>Enterprise network security</description>
	<lastBuildDate>Tue, 07 Sep 2021 15:32:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.7.2</generator>

<image>
	<url>https://cdn.umbrella.marketops.umbrella.com/wp-content/uploads/2020/03/25162453/cropped-cisco-favicon-32x32.png</url>
	<title>Cisco Umbrella</title>
	<link>https://umbrella.cisco.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SASE breakdown: Using DNS-layer security to block unwanted or malicious content</title>
		<link>https://umbrella.cisco.com/blog/sase-breakdown-dns-layer-security</link>
		
		<dc:creator><![CDATA[Chloe Whitaker]]></dc:creator>
		<pubDate>Tue, 07 Sep 2021 08:00:52 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[DNS security]]></category>
		<category><![CDATA[DNS-layer security]]></category>
		<category><![CDATA[sase]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=56902</guid>

					<description><![CDATA[<p>Spend enough time in cybersecurity and you’re bound to have heard colleagues, analysts, and consultants suggest adding DNS-layer protection to your security stack. It’s easy to understand the appeal – using the internet’s infrastructure to block connections to malicious or unwanted domains can help protect any network from online hazards. But recently, with the conversation [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/sase-breakdown-dns-layer-security">SASE breakdown: Using DNS-layer security to block unwanted or malicious content</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What is Gartner&#8217;s SASE model, and how will it affect your security stack?</title>
		<link>https://umbrella.cisco.com/blog/what-is-gartner-sase-and-how-it-affects-security</link>
		
		<dc:creator><![CDATA[Chloe Whitaker]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 08:00:45 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cisco umbrella]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=56756</guid>

					<description><![CDATA[<p>The way we think about networking and cybersecurity has changed dramatically in recent years. The rise of remote workers, coupled with the growing push of company data and infrastructure into the cloud, prompted Gartner to outline a new approach to networking and security: Secure Access Service Edge (SASE). Where an organization’s networking and security solutions [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/what-is-gartner-sase-and-how-it-affects-security">What is Gartner&#8217;s SASE model, and how will it affect your security stack?</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Ransomware attacks, trojans, and loaders</title>
		<link>https://umbrella.cisco.com/blog/cybersecurity-threat-spotlight-ransomware-trojans-loaders</link>
		
		<dc:creator><![CDATA[Artsiom Holub]]></dc:creator>
		<pubDate>Thu, 26 Aug 2021 08:00:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity Threat Spotlight]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=56614</guid>

					<description><![CDATA[<p>Summer may be winding down, but August was still an active month for cybercriminals. In this edition of Threat Spotlight, our cybersecurity threat analysis team discusses the ransomware attacks, trojans, and malware loaders that bad actors are currently using to cripple networks and steal data. Want to learn more about current threat trends? Check out [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/cybersecurity-threat-spotlight-ransomware-trojans-loaders">Ransomware attacks, trojans, and loaders</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Gartner™ quick answer: How can organizations use DNS to improve their security posture</title>
		<link>https://umbrella.cisco.com/blog/gartner-quick-answer-how-can-organizations-use-dns-to-improve-security</link>
		
		<dc:creator><![CDATA[Nicholas Consolo]]></dc:creator>
		<pubDate>Tue, 24 Aug 2021 08:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[DNS security]]></category>
		<category><![CDATA[DNS-layer security]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=56487</guid>

					<description><![CDATA[<p>Looking to improve your organization’s security posture? Don’t forget to secure DNS-layer activity! Learn how – and why – to invest in DNS-layer security here.</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/gartner-quick-answer-how-can-organizations-use-dns-to-improve-security">Gartner™ quick answer: How can organizations use DNS to improve their security posture</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Managing cybersecurity for healthcare providers is complicated. But there is a cure.</title>
		<link>https://umbrella.cisco.com/blog/managing-cybersecurity-for-healthcare-providers</link>
		
		<dc:creator><![CDATA[Cleryson Haber]]></dc:creator>
		<pubDate>Tue, 17 Aug 2021 08:00:44 +0000</pubDate>
				<category><![CDATA[Customer Focus]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=56376</guid>

					<description><![CDATA[<p>As a customer success manager, I had the pleasure of working with Frederick Health, a leading healthcare provider in Frederick County, Maryland. They’ve been on the cutting-edge when it comes to technology, but the recent opening of new locations and the shift towards an increasingly distributed workforce demanded a better approach to healthcare cybersecurity. Healthcare [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/managing-cybersecurity-for-healthcare-providers">Managing cybersecurity for healthcare providers is complicated. But there is a cure.</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Using DNS-layer security to detect and prevent ransomware attacks</title>
		<link>https://umbrella.cisco.com/blog/using-dns-layer-security-for-ransomware-attack-detection-prevention</link>
		
		<dc:creator><![CDATA[Artsiom Holub]]></dc:creator>
		<pubDate>Thu, 12 Aug 2021 08:00:44 +0000</pubDate>
				<category><![CDATA[Threats]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=56297</guid>

					<description><![CDATA[<p>This year has seen a dramatic uptick in ransomware attacks, with high-profile incidents like the Colonial Pipeline attack or the Kaseya attack dominating news cycles. The frequency and cost of these attacks have prompted many cybersecurity professionals to investigate more robust ransomware protection solutions, like DNS-layer security. But how can you make sure your organization’s [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/using-dns-layer-security-for-ransomware-attack-detection-prevention">Using DNS-layer security to detect and prevent ransomware attacks</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The cost of ransomware attacks: Why and how you should protect your data</title>
		<link>https://umbrella.cisco.com/blog/cost-of-ransomware-attacks</link>
		
		<dc:creator><![CDATA[Rachel Ackerly]]></dc:creator>
		<pubDate>Tue, 10 Aug 2021 08:00:05 +0000</pubDate>
				<category><![CDATA[Threats]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=56119</guid>

					<description><![CDATA[<p>As the COVID-19 pandemic ravaged the world in 2020, ransomware attacks grew to epidemic proportions of their own. Almost every day, both large and small companies across every industry – all lacking ransomware protection – were attacked. Now with incidents on the rise, organizations are rushing to implement data protection strategies to reduce their exposure. </p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/cost-of-ransomware-attacks">The cost of ransomware attacks: Why and how you should protect your data</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Scaling cybersecurity with SASE – and what you should look for in a solution</title>
		<link>https://umbrella.cisco.com/blog/scaling-cybersecurity-with-sase</link>
		
		<dc:creator><![CDATA[Negisa Taymourian]]></dc:creator>
		<pubDate>Tue, 03 Aug 2021 08:00:08 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cisco umbrella]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=55996</guid>

					<description><![CDATA[<p>In our last post on SASE security, we covered two key benefits of Secure Access Service Edge architecture — the security and simplicity that come from converging multiple services in a single solution delivered from the cloud. Today, we’re talking about scaling that cybersecurity to meet the growing needs of your business. Cybersecurity at an [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/scaling-cybersecurity-with-sase">Scaling cybersecurity with SASE – and what you should look for in a solution</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>How Cisco Umbrella supported customers during the Akamai DNS outage</title>
		<link>https://umbrella.cisco.com/blog/cisco-umbrella-supports-customers-during-akamai-dns-outage</link>
		
		<dc:creator><![CDATA[Chloe Whitaker]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 08:00:33 +0000</pubDate>
				<category><![CDATA[Spotlight]]></category>
		<category><![CDATA[cisco umbrella]]></category>
		<category><![CDATA[SmartCache]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=55961</guid>

					<description><![CDATA[<p>It’s been a week since the Akamai Edge DNS Service outage. In that time, a bevy of news articles, op-eds, and think pieces have popped up discussing how this most recent domain name system (DNS) failure proves that major enterprises like Amazon, American Airlines, Oracle Cloud, and UPS need to improve their network infrastructure. This [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/cisco-umbrella-supports-customers-during-akamai-dns-outage">How Cisco Umbrella supported customers during the Akamai DNS outage</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Secure Shadow IT to protect your digital transformation</title>
		<link>https://umbrella.cisco.com/blog/secure-shadow-it-to-protect-your-digital-transformation</link>
		
		<dc:creator><![CDATA[Teresa Wingfield]]></dc:creator>
		<pubDate>Tue, 27 Jul 2021 08:00:25 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://umbrella-staging.marketops.umbrella.com/?p=55770</guid>

					<description><![CDATA[<p>What is Shadow IT? Shadow IT is the use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within an organization. It can encompass cloud services, software, and hardware. For several reasons, business and IT/security groups are more at odds than ever before over whether [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://umbrella.cisco.com/blog/secure-shadow-it-to-protect-your-digital-transformation">Secure Shadow IT to protect your digital transformation</a> appeared first on <a rel="nofollow" href="https://umbrella.cisco.com">Cisco Umbrella</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
