惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

GbyAI
GbyAI
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
P
Proofpoint News Feed
L
Lohrmann on Cybersecurity
S
Secure Thoughts
Attack and Defense Labs
Attack and Defense Labs
人人都是产品经理
人人都是产品经理
Stack Overflow Blog
Stack Overflow Blog
W
WeLiveSecurity
O
OpenAI News
SecWiki News
SecWiki News
博客园 - Franky
NISL@THU
NISL@THU
Microsoft Azure Blog
Microsoft Azure Blog
T
Tor Project blog
Microsoft Security Blog
Microsoft Security Blog
aimingoo的专栏
aimingoo的专栏
Security Latest
Security Latest
H
Hacker News: Front Page
Google Online Security Blog
Google Online Security Blog
P
Privacy & Cybersecurity Law Blog
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
D
Darknet – Hacking Tools, Hacker News & Cyber Security
月光博客
月光博客
李成银的技术随笔
Spread Privacy
Spread Privacy
F
Full Disclosure
F
Fortinet All Blogs
T
The Exploit Database - CXSecurity.com
Vercel News
Vercel News
AWS News Blog
AWS News Blog
WordPress大学
WordPress大学
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
V
Visual Studio Blog
J
Java Code Geeks
博客园 - 三生石上(FineUI控件)
G
Google Developers Blog
云风的 BLOG
云风的 BLOG
博客园 - 司徒正美
Engineering at Meta
Engineering at Meta
Last Week in AI
Last Week in AI
P
Palo Alto Networks Blog
宝玉的分享
宝玉的分享
T
True Tiger Recordings
N
News and Events Feed by Topic
酷 壳 – CoolShell
酷 壳 – CoolShell
Cisco Talos Blog
Cisco Talos Blog
N
News | PayPal Newsroom
S
SegmentFault 最新的问题
Jina AI
Jina AI

Cisco Blogs

Cisco Partners With College Board to Launch AP Cybersecurity and Expand Career-Connected Learning Fueling “The Greatest Spectacle in Racing®” AI-generated reporting: Lessons learned from Cisco Talos Incident Response Cisco Named a Leader in the 2026 Gartner® Magic Quadrant™ for Enterprise Wired and Wireless LAN Infrastructure AI network performance with Cisco Intelligent Packet Flow Building a world-class employee experience | FY25 Purpose Report Real-World Skills for Real World Challenges: AI-Led Updates Across Cisco Certification Portfolio Learn with Cisco at Cisco Live 2026: Your Week for Skills, Certs, and What’s Next Cisco N9000 excels in EANTC 2026 VXLAN EVPN and timing tests Innovating at the Speed of Business: Announcing the Customer Achievement Awards AMER 2026 Finalists Future of Sports Analytics: Building Trust and Intelligence with SūmerSports and Cisco Accelerate Your Career and Impact with CCNA Certifications Skills-based volunteering for the AI era: Inside Cisco’s first Tech for Social Good Hackathon Cisco Live 2026: Bringing the Future of Customer Experience to Las Vegas Mission-First: Equipping the Digital Warfighter at AFCEA TechNet Cyber 2026 Edge opportunity for service providers: Turn infrastructure into new services MRC and SRv6: How Foundational Networking Innovations Are Enabling the Next Generation of AI Supercomputers The SMB Marketing Reset: Winning Customer Trust in a Digital-First Economy Inside the SOC: AI-powered DNS defense against ransomware Our Path Forward Securing the Federal Digital Experience with Cisco ThousandEyes for Government State-sponsored actors, better known as the friends you don’t want Cisco at ONUG Dallas 2026: Securing the AI Data Center in the Agentic Era Cisco and Red Hat are powering intelligent core to edge: Red Hat Summit insights Building the Capabilities That Win: How Cisco Partners Can Lead in the SMB & Mid-Market Era How Two Hours Felt Bigger Than My To-Do List Announcing Foundry Security Spec Ace the CCIE Collaboration Lab: Success Tips from a TAC Engineer Turned CCIE Improving Labeling Consistency with Detailed Constitutional Definitions and AI-Driven Evaluation Protecting Agents with Cisco AI Defense and Google Agent Development Kit Powering an Inclusive Future: Your guide to the Purpose Pavilion at Cisco Live Las Vegas The Infrastructure Behind the Mission: SOF Week 2026 Cisco Networking App Marketplace Partners at Cisco Live 2026 Beyond the Pilot: Building the Clinical Data Fabric for the Agentic Era Benchmarking scale-out AI fabrics with Cisco N9000 + AMD Pensando™ Pollara 400 NICs Month of Developer Productivity: Build and Forget The race to autonomous transport networks: A new study Lean IT, future-ready: How to save time and simplify wireless management with AI Reading Between the Pixels: Failure Modes in Vision Language Models Biochar’s triple win: Healthier soils, improved crops, and decarbonization Designing a Proactive Customer Journey Modernize your data center operations with Cisco Nexus Dashboard Why your automation stack needs Cisco Agentic Workflows Try Cisco AI Defense Explorer Edition in this hands-on lab From Bandwidth to Intelligence: How Cisco is Powering AI-Ready Networks Spotlight on digital transformation | FY25 Purpose Report Galaxy Mode is live: A limited-time look at what your Cisco AI Assistant and AgenticOps can already do Securing the Agentic Workforce: Cisco Announces Intent to Acquire Astrix Security Understanding CISA BOD 26-02: Mitigating Risk from End-of-Support Edge Devices Digging Deeper: The Future of Mining with Automation and Ultra-Reliable Wireless Voices from the field: Helping farmers build resilient local economies across rural America Built like a startup, scaled like Cisco: Transforming data center cooling for the AI era Defining Model Provenance: A Constitution for AI Supply Chain Safety and Security Introducing Model Provenance Kit: Know Where Your AI Models Come From Security Insights: A Threat-First View for the Platform That Enforces Access How I Turned My Curiosity into a Patent From Strategy to Architecture: How Cisco is Building a Quantum-Safe Future Maximizing Managed Security Services: A Strategic Guide to Optimizing Your Portfolio (Part 1 of 2) Simplify access control in five easy steps Trust: Why security is your next growth engine Cisco IQ is generally available. Here’s what that actually means. From Vision to Reality: Intelligence in Action with Cisco IQ How connectivity is shaping the future of surgical care The power of your network: Solving a physical security incident on Vision portal 5 signs your data center is holding your AI strategy back Stop Overthinking OT Security: The Total Cost of Ownership and Being Smart with Refreshes AI-Ready, Simpler, and More Secure WAN: Cisco SD-WAN Innovations Scaling the digital future: Why AI and skills investments matter for business and society Expanding our Product Organization Recap Scaling the Future: Reddit AMA on Network Automation at Scale Product sprints for developer-oriented portals and content Bringing Professional-Level Skills to Cisco Networking Academy Announcing Cisco Availability in Google Cloud Marketplace: A New Path to Scalable, Partner-Led Growth The Innovation Paradox: How We Reduced Incidents by 25% While Deploying Faster Funding the AI-ready data center: Why flexibility wins The switch that quantum networking has been waiting for From a Message I Couldn’t Believe to a Stage I’ll Never Forget The Hidden Bottleneck Slowing Down Manufacturing Transformation 30 Years as a CCIE: Why Certifications Matter in the AI Era Securing Enterprise AI: Cisco AI Defense Expands to Google Cloud How ThousandEyes Closed the Cloud Visibility Gap by Solving It Themselves First Energy Will Define the Scale of AI Introducing the AI Agent Security Scanner for IDEs: Verify Your Agents Stop Overthinking OT Security: People, Process and Technology Powering the Future of Research: Join Cisco at NLIT 2026 Building the Digital Foundation for a Smarter West Lincoln Memorial Hospital How Cisco built an AI-RRM that maximizes your wireless solution From Automation to Autonomy: Cisco and Rockwell Power a New Era for Manufacturing Unlocking the Future of Fan Engagement: The Power of VisionEDGE Find Yourself in the Future: AI Is the New Baseline—Here’s How to Build Your Skills One Day with Our Customers: Driving better outcomes through customer centricity What It Really Takes to Build an AI-First Workforce From Connectivity to Security: How E80 Future-proofed its AGV Operations with Cisco The Infrastructure of a Floating City: AIDA Cruises’ CX-Led Digital Transformation Scaling your network for AI without a forklift upgrade Why modern networks are moving DDoS defense to the edge Evolve IP Media to AI-Driven Media Fabrics: Future-Proof Broadcast with Cisco and NVIDIA Cisco and Generation are scaling AI-powered pathways to employment Reading Between the Pixels: Assessing Prompt Injection Attack Success in Images Lean IT, future-ready: Why Wi-Fi is your AI growth strategy
Enhancing Cisco Secure Email Gateway: Safer Clicks and Cleaner Files
Abdalla Taha · 2026-05-21 · via Cisco Blogs

A Zero Trust approach to email assumes that content shouldn’t be implicitly trusted just because it reached the inbox. That assumption matters more every year, because attackers have gotten better at hiding in the gray area between obviously good and obviously bad. A link can look harmless at delivery and weaponize hours later. An attachment can look like a routine invoice, resume, or quarterly report while carrying hidden active content. Signature-based detection and sandboxing still catch a lot — but they miss new, delayed, and highly targeted attacks by design.

Two capabilities now available for Cisco Secure Email Gateway address exactly this gap: Remote Browser Isolation (RBI) and Content Disarm and Reconstruction (CDR). Together they shift the security posture from detect and react to isolate and neutralize — protecting users at the two moments they’re most exposed: when they click a link, and when they open a file.

Remote Browser Isolation: safer clicks

When a user clicks a link in an email, RBI opens the destination in a remote, isolated environment rather than directly on the endpoint. The user still sees and interacts with the page, but the active web content — scripts, downloads, browser exploits — never touches their machine or the internal network. If the site turns out to host malware, a credential-harvesting form, or a drive-by download, the threat executes in the isolation environment and is discarded. The user keeps working; the attacker hits a wall.

RBI-Blog-Image

Content Disarm and Reconstruction: cleaner files

CDR takes the same assumption to attachments. Instead of asking is this file malicious?, it assumes any active content (macros, embedded scripts, OLE objects, JavaScript in PDFs — anything that can execute) could be dangerous, strips it out, and rebuilds a clean, usable copy of the document. Employees still get the invoice, the report, the resume. The executable surface that attackers depend on simply isn’t there anymore.

CDR also extends RBI’s protection into the document itself: URLs and QR codes embedded in attachments are rewritten to route through RBI when the user clicks or scans them. That matters because attackers increasingly hide links inside documents — and inside QR codes especially — to bypass the URL inspection applied to message bodies.

CDR Blog Image

How RBI and CDR fit into Cisco Secure Email Gateway

Adding RBI and CDR to the gateway means organizations no longer depend on perfect threat identification at the moment of delivery. Even when a threat slips past detection — and some always will — the dangerous parts can’t run.

Both capabilities are designed to fit how email security teams already work. RBI is native to Cisco Secure Email Gateway: the SEG rewrites URLs directly in the message, so links route through the isolation service at click time with no additional product in the mail path. CDR is policy-driven: customers use the SEG’s content filters to decide which messages get rerouted to the CDR gateway for sanitization — by sender, recipient, attachment type, risk score, or any other condition that fits their use case. This gives organizations precise control: apply the heavier treatment exactly where their risk policy calls for it and leave trusted mail flows untouched.

The business outcomes:

  • Users click and open with less risk, so they spend less time second-guessing legitimate email.
  • Security teams see fewer phishing, malware, and credential-theft incidents reaching the point of impact — and the ones that do see are easier to contain.
  • Productivity stays intact, because access to needed content isn’t traded away for safety.

A more resilient email layer

Modern secure email gateways are no longer only about keeping bad messages out. They’re about making email safer to use when threats inevitably get through. RBI and CDR close two of the most exploited gaps in that journey — the click and the open — and turn them from points of failure into contained, recoverable events. 

RBI and CDR are available as add-on licenses to Cisco Secure Email Gateway. 

See how RBI and CDR perform against your real email traffic — contact your Cisco account team to start a trial.


We’d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.

Cisco Security Social Media

LinkedIn
Facebook
Instagram