Security

October 14, 2014

SECURITY

Gartner’s perspective on Cisco TrustSec

I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and i…

October 8, 2014

SECURITY

Security and the Internet of Everything

The theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” At Cisco, security is everyone’s responsibility – from our trustworthy development processes, to innovation enabling our customers and partners to address threats on end points, networks,…

October 7, 2014

SECURITY

To Succeed with Big Data, Enterprises Must Drop an IT-Centric Mindset; Securing IoT Networks Requires New Thinking

To help organizations who aspire to apply the power of big data enterprise-wide, Cisco provides a powerful, efficient, and secure infrastructure and a wide array of analytics solutions. In our previous blogs, others have highlighted the benefits of Cisco’s ability to provide the scalability, ability…

October 6, 2014

SECURITY

Nominations are Now Open for Cisco Champions for Security

Are you passionate about security technology? Are you interested in connecting with a global network of people like you? If so, you could be a good candidate to join the all-new Cisco Champions for Security group. Cisco Champions are a group of individuals from around the world who enjoy connecting…

October 2, 2014

SECURITY

Visualizing a String of Paerls

Researchers from the Cisco Talos Security Intelligence and Research Team recently discovered an elaborate attack dubbed the String of Paerls. The attack, a combined spearphishing and exploit attempt, was able to bypass most antivirus engines and used a targeted phishing email that included a malicio…

October 1, 2014

SECURITY

Cisco Identity Services Engine (ISE) Further Expands Technology Partner Ecosystem

It’s the 25th anniversary of the film Field of Dreams, the movie about an Iowa farmer who hears a whisper that says, “If you build it, he will come.” Given the need for control with context for secure access initiatives, we did build it–and they have come. After its introduction last year, momentum…

September 30, 2014

SECURITY

Greater Dynamic Controls for Secure Access and Mobility

Businesses today are required to meet multiple challenges with respect to connecting users to applications. First, it is no secret that the demands of employees and users are great–they expect access to enterprise resources and their work via more mediums than ever before–by personal laptops, tablet…

September 25, 2014

SECURITY

Looking Forward to Cisco’s Internal Security Conference: SecCon 2014

Cisco’s internal security conference (SecCon) is just around the corner and this year marks our seventh anniversary! In previous years SecCon participants heard from a renowned privacy specialist, a Chief Security Officer from a large customer, a cyber security coordinator for two U.S. Presidents, a…

September 24, 2014

SECURITY

Announcing the Cisco IOS Software Security Advisory Bundled Publication

Today, we released the final Cisco IOS Software Security Advisory Bundled Publication of 2014. Six years ago, Cisco committed to disclosing IOS vulnerabilities on a predictable schedule (on the fourth Wednesday of March and September each calendar year) in direct response to your feedback. We know t…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security