Articles
Is Network Security Complexity Holding You Back?
At its most fundamental level, the objective of network security is a simple one. Organizations need to protect their people, assets, and the data that travels across and resides within their networks. They do this by setting security policies that detail parameters like who or what is allowed to ac…
#CiscoChat Podcast: Exploring Encrypted Traffic Analytics
Welcome to the third installment of the new #CiscoChat podcast. This episode, recorded live from the Cisco Live Las Vegas floor, focuses on security — and more specifically, on encryption. Aside from detailing recent developments in this rapidly developing field, it also offers a glimpse into Cisco’…
Get Up to Speed on Security at Cisco Live US 2017
Your guide to all things cybersecurity at Cisco Live Each year, thousands of people come to Cisco Live to learn and connect around the latest technologies. From visionary keynotes to cutting-edge technical training sessions, there are nearly endless opportunities. Navigating the conference can be in…
Security Sneak Peek at Cisco Live US 2016
If you’re interested in cybersecurity (and really, who isn’t these days?), you have a lot to look forward to at Cisco Live US. Digital Business Transformation will be in the spotlight this year and our world-class experts will be sharing how security acts as a fundamental enabler of that transformat…
Nominations are Now Open for Cisco Champions for Security
Are you passionate about security technology? Are you interested in connecting with a global network of people like you? If so, you could be a good candidate to join the all-new Cisco Champions for Security group. Cisco Champions are a group of individuals from around the world who enjoy connecting…
Visualizing a String of Paerls
Researchers from the Cisco Talos Security Intelligence and Research Team recently discovered an elaborate attack dubbed the String of Paerls. The attack, a combined spearphishing and exploit attempt, was able to bypass most antivirus engines and used a targeted phishing email that included a malicio…