Articles
Staying Ahead of ‘Andromeda-Style’ Threats in Your Environment
Why rapid attack containment and a short remediation cycle matter When a new threat gets in the environment, a security incident could unfold very quickly. Detecting the compromise and taking control of the infected endpoint fast is not only critical to preventing the spread of the threat, it is als…
Cisco Stealthwatch becomes the only security analytics product to detect threats across private networks, public clouds, …
You have a bigger, more open, and diverse network than ever before. Whether you want to go all-in on cloud, spread your infrastructure across multiple public clouds, embrace containers and Kubernetes, leverage serverless architectures, or double down on on-premise, Cisco Stealthwatch has you covered…
Extend Your Security to the Cloud with Confidence
Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when…
Cisco Defense Orchestrator: The Security Policy Management “Easy Button”
Staying on top of security is hard, especially for network operations staff. If you’re like most of your peers, you probably have lots of devices, tons of policies and many locations and even cloud deployments to account for. Every time you need to change a policy, the complexity and time involved t…
Don’t Let Your Cloud Security Strategy Get Railroaded by Old Thinking
The standard gauge used for railroads (that is the distance between the rails) in the U.S. is four feet, eight and a half inches, which is an odd number however you look at it. The history behind it is even stranger and is a cautionary tale of assumptions and the consequences of basing decisions on…