Security

November 4, 2014

SECURITY

A Dynamic Integration: FireSIGHT and ISE

With the security landscape constantly evolving and attackers innovating at the rapid pace, it is important that we keep up with attackers.  For this reason we have based our security on imperatives like being visibility-driven and platform-based. Organizations need total visibility of their environ…

October 30, 2014

SECURITY

Ensuring Security and Trust Stewardship and Accountability

In our increasingly interconnected world, the Internet of Everything is making trust a critical element of how people use network-connected devices to work, play, live, and learn. The relentless rise in information security breaches underscores the deep need for enterprises and governments alike to…

October 29, 2014

SECURITY

The Value of Endpoint and Network Protection Together

As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack ve…

October 28, 2014

SECURITY

File Security With the Click of a Button

Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, f…

October 27, 2014

SECURITY

Can the Elephant Dance to a Security Tune?

There is a great debate in the security world right now: have SIEM and logging products run their course? Will Hadoop ride to the rescue? Can machines “learn” about security and reliably spot threats that no other approach can find? Gartner calls this phenomenon Big Data Security Analyti…

October 22, 2014

SECURITY

Endpoint Visibility is Key to Combatting Attacks

As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used…

October 16, 2014

SECURITY

New Security White Paper: Unified Computing System (UCS) Hardening Guide

Check out the new Cisco UCS Hardening Guide white paper which is now released  and available on the Cisco Security Portal. The paper outlines and highlights security best practices for Cisco UCS. This paper provides information to help users secure Cisco Unified Computing System (Cisco UCS) platform…

October 15, 2014

SECURITY

Announcing the IoT Security Grand Challenge Winners

The Internet of Things (IoT) is exponentially increasing the number and type of attack vectors, creating many new cybersecurity challenges for organizations and those responsible for defending the infrastructure. These new threats to data and physical security are a top concern for organizations as…

October 15, 2014

SECURITY

Naughty Users! Protect Your Endpoints From Users’ Bad Behavior

Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to f…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security