Articles
Introducing SecureX
Making Security an Enabler, so Your Business Can Take an Exponential Leap I joined the Cisco Security team the week after the RSA Conference in 2017. At that time there was a lot of discussion around the journey Cisco Security was on, particularly around our efforts to deliver an integrated architec…
4 Cybersecurity Trends that Will Make an Impact in 2020
My cybersecurity trends outlook for 2020 builds on my forecast for 2019. Identity and application security are still top-of-mind this year, but in new and more advanced ways. As we approach RSA 2020, these are four trends in cybersecurity that I expect will make an impact this year. 1. Zero Trust g…
Time for Some Straight Talk Around Network Traffic Analysis
According to research from the Enterprise Strategy Group, 87% of organizations use Network Traffic Analysis (NTA) tools for threat detection and response today, and 43% say that NTA is a “first line of defense” in case of an attack. The increasing IT complexity is one of the main factors in the adop…
Cisco and IBM: Solving Customer Challenges through the Power of Partnerships
Complexity is one of the top challenges our customers face today. CISOs not only want to enable their teams to detect and respond to threats faster, they want to simplify workflows and streamline operations at the same time. In our annual CISO surveys, we’ve been seeing a trend toward vendor consoli…
Securing Your Future by Innovating Today
At a time when cybercrime costs three times more than natural disasters globally1, the demands on security are constantly growing. Whether you’re asked to protect a workforce that roams anywhere, a workplace that is digitized, or workloads that run wherever, your disparate security solutions are cre…
Find What Your Endpoint Anti-Malware is Missing with CESA Built on Splunk
There are many aspects to securing an endpoint beyond finding the malware on it. What do you know about the behavior of your endpoints? Can you track anomalous traffic? Can you tell what the applications and other software processes are up to? What is happening when the device is off the corporate…
A Bridge to the Future of the Firewall
Cisco Defense Orchestrator adds support for new platforms, cloud logging and advanced analytics Organizations today are faced with securing their business everywhere across their hybrid networks – from the campus network, to remote sites, to public clouds and remote employees. This explosion o…
Cisco and BT at 30: Creating a Future-Proof Security Solution
Some things just get better with age. And you could say the same for the over 30-year partnership between Cisco and BT. Through the course of our partnership, Cisco and BT have innovated together to deliver network and IT solutions around the world. At Cisco, we view service provider partners as an…
Balancing the risks and rewards of connected manufacturing
The most expensive cyber security event ever, started with a software accounting package from the Ukraine. In its wake 25% of the world’s shipping was shut down, major automobile and pharmaceutical companies came to a stop. And now a major lawsuit between an insurance provider and its customer has c…
7