Security
Cisco Security First: Focusing on the Issues of Incident Response and Security Teams
Cisco CSIRT is a global team of information security professionals responsible for the 24/7 monitoring, investigation and response to cybersecurity incidents for Cisco-owned businesses. CSIRT engages in proactive threat assessment, mitigation planning, incident detection and response, incident trend…
Customers Deserve Transparency to Manage Risk
Our commitment to customers is to be open and transparent, especially as it relates to issues that could negatively impact their business. At Cisco, our leadership made the decision over twenty years ago that we would clearly communicate with customers about technical or other issues that could pote…
Malicious Forces Cracking your SD-WAN Concrete? Reinforce your Network with Cisco SD-WAN Security
Security must be deep-rooted into every software-defined WAN (SD-WAN) solution rather than bolted on as an afterthought, much like the process of planting reinforcement steel in concrete. Concrete has been used in construction for more than a thousand years. It has excellent compressive strength whi…
Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy. Time will tell whether we see such romanticized stories of dashing rogues based on this new golden age of crimi…
The State of Machine Learning in 2019
Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression I had. Our 2019 CISO Benchmark Report however, found that between 2018 and 2019, CISO interest in machine learning dropped…
Incident response: Putting all the R’s in IR
It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.” The landscape is challenging, tools are multiplying, and the talent shortage seems insurmountable. First of all, according to…
“Spark Joy” With New 12.0 Email Security Features & Videos
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0 release of Cisco Email Security is anything other than extraordinary. Here are three reasons why: Our SVP of Product Management, Jeff Re…
The PSIRT Services Framework: Helping the Industry Protect the Ecosystem
At Cisco, our leadership made the decision over twenty four years ago that we would clearly publicly communicate security vulnerabilities or other issues that could potentially expose customers to risk. This is when the Cisco Product Security Incident Response Team (PSIRT) was born. Our team and the…
TLS Fingerprinting in the Real World
To protect your data, you must understand the traffic on your network. This task has become even more challenging with widespread use of the Transport Layer Security (TLS) protocol, which inhibits traditional network security monitoring techniques. The good news is that TLS fingerprinting can help…
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171458-Screen-Shot-2020-01-17-at-12.13.39-PM-150x150.png)
Why Cisco Security?
Explore our Products & Services
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171933-Screen-Shot-2020-01-17-at-12.14.33-PM-150x150.png)
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2