Security
Cryptographic Visibility: Quality Encryption at Your Fingertips
There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of the useful analytics I have ever delivered to the market have been grounded in asking the right questions. With that in mind, I’d lik…
Kill Complexity with Cisco Defense Orchestrator
It’s often said that “complexity is the enemy of security.” It’s true, in so many ways. If a security product is too complex to manage, it will slow down your investigations which slows down your ability to detect and stop threats. Naturally, you’ll gravitate to an easier-to-use product. If your sec…
Black Hat Asia 2019: Watch Out for the Secondary Payload
Black Hat 2019 returned to Singapore with Black Hat Asia with four days of Trainings and Briefings, with the Business Hall. Cisco Security is proud to be a Technology Partner of Black Hat in the Network Operations Center’s (NOC) Security Operations. The focus of the NOC is to provide secure and open…
Social media and black markets
You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access. Unfortunately, that’s not always the case. Sometimes s…
The Cisco Customer Experience: More Than Just Business
Having the right tools and solutions in place is only one part of the secure network equation. The security landscape is always changing and evolving at a rapid rate. Our customers face threats every day and need to respond to those threats at a moment’s notice. The pressure and demand to stay ahead…
Women Leading in Cyber – Welcome to WiCyS 2019
It’s time for the annual Women in Cyber Security Conference (WiCyS). We’re proud that Cisco is once again a VIP sponsor as well as a Founding Partner of this motivating and important event. We have some great activities in store, including welcoming eight high school girls and their two chaperones a…
The One-Two Punch of User and Device Trust
Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access…
Your money or your life: Digital extortion scams
There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from…
Hello World! Contextual Identity Within the Spacetime Continuum
Hello world! I think that’s the obligatory first line for any technology blog, right? But, how do you know I am here? How do you know I exist? I have a blog profile, I have a picture, I have a blog tagged to my name. All of these are contextual clues that I exist in reality, without actually being p…
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171458-Screen-Shot-2020-01-17-at-12.13.39-PM-150x150.png)
Why Cisco Security?
Explore our Products & Services
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171933-Screen-Shot-2020-01-17-at-12.14.33-PM-150x150.png)
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security