Security

December 23, 2014

SECURITY

Issues and Dilemmas in Information Security Practices

Editor’s note: In A Circular Problem in Current Information Security Principles, we highlighted one of the challenges in our knowledge domain that contributes to the ineffectiveness of today’s information security practices. In this third installment, we review the issues and dilemmas that are commo…

December 22, 2014

SECURITY

Continuous Protection on the Endpoint: Show Me

Advanced malware is dynamic, elusive, and evasive. Once it slithers into the organization’s extended network, it can very quickly proliferate, cause problems, and remain undetected by traditional point-in-time security tools. These tools poll or scan endpoints for malware or indicators of comp…

December 18, 2014

SECURITY

Cloudy with a Chance of Scalable Malware Protection

The proven value of Software-as-a-Service (SaaS) solutions, that we all access daily from multiple devices, makes the cloud a reality, but SaaS also creates an environment in which anyone, anywhere in an organization, can be attacked at any time. Modern Networks go beyond traditional walls and inclu…

December 16, 2014

SECURITY

A Circular Problem in Current Information Security Principles

Editor’s Note: In this second installment of the blog series on more responsive security, we take a closer look at the circular problems associated with four common security principles in managing “weak link” risks in Information Technology organizations. Before discussing what con…

December 15, 2014

SECURITY

Key Considerations for Threat-Based Security Programs

As we often say at Cisco, every business is a security business. That’s been true ever since widespread online presence led to widespread cyber threats. It became even more applicable as those threats became more sophisticated and less detectable. And now, with the Internet of Everything (IoE), that…

December 12, 2014

SECURITY

A Model for Evaluating Breach Detection Readiness

Given that modern attacks are complex and sophisticated, there is not a single product or tool that will ever be 100% effective at detecting threats. Prevention eventually fails. Therefore, you need protection before, during, and after an attack. Modern-day networks are large and complicated. It is…

December 11, 2014

SECURITY

Reintroducing Snort 3.0

A little more than a year ago when Sourcefire became a part of Cisco, we reaffirmed our commitment to open source innovation and pledged to continue support for Snort and other open source projects. Our announcement of the OpenAppID initiative earlier this year was one of several ways we have delive…

December 9, 2014

SECURITY

Understanding and Addressing the Challenges of Managing Information Security – A More Responsive Approach

Just like bad weather conditions found in nature, such as typhoons, hurricanes, or snowstorms, technology system defects and vulnerabilities are inherent characteristics found in a cyber system environment. Regardless of whether it’s a fair comparison, weather changes are part of the natural environ…

December 5, 2014

SECURITY

Exciting Fourth Edition of SecCon-X Bangalore

The week of November 10 was filled with learning and excitement for security technology enthusiasts at Cisco’s Bangalore campus as people gathered for SecCon-X 2014, Cisco’s largest annual cross-company security conference. The event scaled in scope and content compared to last year, sta…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security