Security
Summary: The Extended Network Requires Security That’s the Same, Only Different
Information Technology (IT) and Operational Technology (OT) networks have historically been completely separate, with users of each living in blissful isolation. But the Internet of Things (IoT) is changing all of that! In the IoT paradigm, IT and OT professionals will need to work together to drive…
Cisco Announces Managed Threat Defense Service
While out talking to customers, I’ve continually heard about three fundamental security challenges they are wrestling to manage: changing business models, a dynamic threat landscape, and fragmentation of security solutions. The 2014 Cisco Annual Security Report estimates there will be a global shor…
Cisco IPS Signature Coverage for OpenSSL Heartbleed Issue
The Cisco IPS Signature Development team has released 4 signature updates in the past week. Each of the updates contains either modifications to existing signatures or additional signatures for detection of attacks related to the OpenSSL Heartbleed issue. I’m going to take a moment to summarize the…
Summary: IoT Holds Great Promise – But Ensuring Its Security Takes Strong Leadership and Teamwork!
Despite the many benefits of IoT, the billions of connected sensors, devices, and other smart objects it comprises will also dramatically increase the diversity of threats we will face. As a result, ensuring that we can reap the overwhelming benefits of IoT without undermining security will take str…
On Cisco.com password changes
Last week I published a brief blog about the OpenSSL heartbeat extension vulnerability, also known as the Heartbleed bug. One commenter asked, “What about the Cisco.com website? Is it safe to change our passwords on the site?” We received a handful of similar questions from customers today, so I wou…
Not If, but When: The case for Advanced Malware Protection Everywhere
A recent Bloor Research Market Update on Advanced Threat Protection reminds us of something that many security vendors have long been loath to acknowledge: traditional, point-in-time technologies, like anti-virus or sandboxes, are not entirely effective when defending against complex, sophisticated…
Making Your Metrics Program Effective Beyond Just Charts and Numbers
Editor’s Note: This is the third part of a four-part series featuring an in-depth overview of Infosec’s (Information Security) Unified Security Metrics Program (USM). In this installment, we discuss the effectiveness of the USM program at Cisco. Information security is all about risk red…
Cisco Live 2014 San Francisco: Security Technology Track
Cisco Live, May 18-24, 2014, is quickly approaching and registration is open. This is the 25th anniversary of Cisco Live and we return to the Bay Area at San Francisco’s Moscone Center. Educational sessions are organized into technology tracks to make it easy to find the topics that most inter…
Year-Long Exploit Pack Traffic Campaign Surges After Leveraging CDN
This post is coauthored by Andrew Tsonchev. Anyone can purchase an exploit pack (EP) license or rent time on an existing EP server. The challenge for threat actors is to redirect unsuspecting web browsing victims by force to the exploit landing page with sustained frequency. Naturally, like most cri…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security