Security
Securing Mobile Data in the Event of Device Loss or Theft
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…
Behind the Music: The New Threat Management with NextGen IPS CVD
If you’ve ever caught an episode of VH1’s Behind the Music, the TV series that profiles rock bands and personalities, you may agree with me that it can be fascinating. I especially like the interviews about the creative process. I’ve learned that great songs can come from just about anyw…
Filtering Explicit Content
Many web sites provide a setting to reduce the amount of explicit, or objectionable, content returned by the site. The user configures these settings, but many users are unaware such a setting exists, or that it needs to be set for each web site. Additionally, the security administrator cannot audit…
You’re Only as Secure as Your Weakest Link: Operationalizing Security
I am reminded of the wisdom of the old saw that “no news is good news” as almost every day brings us headline after headline highlighting that yet another company has experienced a systems breach and valuable data has been compromised. Companies continue to increase the amount of money spent on cybe…
Social Engineering: Finding the Weak Links In-Person
An enterprise can pay hundreds of thousands of dollars or more for the latest security software and imagine itself protected from targeted attacks that come in via the network. But if the threat is a real-live person who walks in the front door of an office or server farm, what good can the network…
The increasing prevalence and complexity of malware
In recent months, many organizations are becoming more interested in the information security landscape and how these threats can affect their business today. In the recent Cisco 2014 Midyear Security Report, the results showed that 90% of select customer networks were found issuing DNS queries to d…
Cisco Security Launches New Security-Focused Community
Have threat-centric security questions and don’t know where to turn? Wish you could engage with Cisco Security experts and your peers? Good news! … (drumroll please)…. introducing the Cisco Security Community! The Cisco Security Community is expressly designed to connect you with Cisco Securi…
Security Compliance is Necessary for Real-Time Mobile Data Access
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…
Cisco 2014 Midyear Security Report: Brush Your Teeth, Change Your Passwords, Update Your Software
Listening to the radio on the way to work recently, I heard that hackers had stolen some 1.2 billion usernames and passwords, affecting as many as 420,000 websites. When asked what listeners could do to protect themselves, the security expert speaking recommended changing passwords. He did not menti…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security