Articles
Establishing Device Trust to Secure the Workforce
Challenges of Protecting Endpoints With an estimated 70% of breaches starting on endpoints – laptops, workstations, servers, and mobile devices – organizations need visibility into the devices connecting to applications both on the network and in the cloud. Organizations need the abilit…
Duo and ISE Integrated Use Case – Delivering Zero Trust security for the workforce and workplace
This blog series will highlight exciting new developments and integrations between solutions within the Cisco Security portfolio with our acquisition of Duo Security. These posts will cover details about the problems that are being solved by these integrations with links to helpful technical documen…
Ingredients Needed to Manage Network Tribbles
Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Sometimes it feels like network admins are Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex. Using a complicated mix of cl…
New Year, Same Reality: How Much Will Security Actually Change in 2019
If we look back at the security landscape of 2018, there were some interesting highs and lows. There were a number of large-scale breaches in the news attributed to hackers, involving notable companies. All indications for 2019 don’t show any signs of this activity stopping or slowing down. In fact…
4