Security

July 25, 2014

SECURITY

Cyber Threat Management from the Boardroom Risk: Lost in Translation

I was at the Gartner Security and Risk Management Summit at the Gaylord National Harbor and had the opportunity to attend the session, “Finding the Sweet Spot to Balance Cyber Risk,” which Tammie Leith was facilitating. During the session, the panel had been discussing how the senior le…

July 24, 2014

SECURITY

Securing Mobile Data: What’s Your Plan?

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…

July 23, 2014

SECURITY

The Earth Isn’t Flat and Your Network Shouldn’t Be Either

Information is arguably one of any organization’s most valuable and business critical assets. Despite this, many information networks are, for all intents and purposes, flat networks. That is, networks with few flow controls over data which are then allowed to flow freely. This means that the most…

July 22, 2014

SECURITY

Retailer Data Breach Trend Not Likely To Subside

While we consumers certainly worry about security, the concerns of retailers are magnified because they are among the highest-profile targets right now for professional hacker attacks. At the same time, change is continuing on the security front, particularly in the area of PCI compliance. With the…

July 21, 2014

SECURITY

Old and Persistent Malware

Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:…

July 18, 2014

SECURITY

You Can’t Protect What You Can’t See

The title seems like a simple enough concept, but when it comes to advanced threat protection, truer words were never written. This concept of visibility into your network, which in turn enables better protection and control of your network, is at the heart of Cisco’s Next-Generation Intrusion…

July 17, 2014

SECURITY

The Risk of Remote Connection: What’s Your Plan?

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…

July 16, 2014

SECURITY

Unified Security Metrics Program—Live at RSA Singapore

Noted business management author Peter Drucker famously said, “What’s measured is improved.” When applied to the world of security, meaningful security metrics can literally transform an organization and solve real business problems. At Cisco, Unified Security Metrics (USM) combine…

July 14, 2014

SECURITY

Big Data: Observing a Phishing Attack Over Years

Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sop…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security