Security
A Dynamic Integration: FireSIGHT and ISE
With the security landscape constantly evolving and attackers innovating at the rapid pace, it is important that we keep up with attackers. For this reason we have based our security on imperatives like being visibility-driven and platform-based. Organizations need total visibility of their environ…
Ensuring Security and Trust Stewardship and Accountability
In our increasingly interconnected world, the Internet of Everything is making trust a critical element of how people use network-connected devices to work, play, live, and learn. The relentless rise in information security breaches underscores the deep need for enterprises and governments alike to…
The Value of Endpoint and Network Protection Together
As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack ve…
File Security With the Click of a Button
Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, f…
Can the Elephant Dance to a Security Tune?
There is a great debate in the security world right now: have SIEM and logging products run their course? Will Hadoop ride to the rescue? Can machines “learn” about security and reliably spot threats that no other approach can find? Gartner calls this phenomenon Big Data Security Analyti…
Endpoint Visibility is Key to Combatting Attacks
As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used…
New Security White Paper: Unified Computing System (UCS) Hardening Guide
Check out the new Cisco UCS Hardening Guide white paper which is now released and available on the Cisco Security Portal. The paper outlines and highlights security best practices for Cisco UCS. This paper provides information to help users secure Cisco Unified Computing System (Cisco UCS) platform…
Announcing the IoT Security Grand Challenge Winners
The Internet of Things (IoT) is exponentially increasing the number and type of attack vectors, creating many new cybersecurity challenges for organizations and those responsible for defending the infrastructure. These new threats to data and physical security are a top concern for organizations as…
Naughty Users! Protect Your Endpoints From Users’ Bad Behavior
Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to f…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security