Security

April 16, 2019

SECURITY

Cryptographic Visibility: Quality Encryption at Your Fingertips

There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of the useful analytics I have ever delivered to the market have been grounded in asking the right questions. With that in mind, I’d lik…

April 16, 2019

SECURITY

Kill Complexity with Cisco Defense Orchestrator

It’s often said that “complexity is the enemy of security.” It’s true, in so many ways. If a security product is too complex to manage, it will slow down your investigations which slows down your ability to detect and stop threats. Naturally, you’ll gravitate to an easier-to-use product. If your sec…

April 15, 2019

SECURITY

Black Hat Asia 2019: Watch Out for the Secondary Payload

Black Hat 2019 returned to Singapore with Black Hat Asia with four days of Trainings and Briefings, with the Business Hall. Cisco Security is proud to be a Technology Partner of Black Hat in the Network Operations Center’s (NOC) Security Operations. The focus of the NOC is to provide secure and open…

April 5, 2019

SECURITY

Social media and black markets

You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access. Unfortunately, that’s not always the case. Sometimes s…

April 3, 2019

SECURITY

The Cisco Customer Experience: More Than Just Business

Having the right tools and solutions in place is only one part of the secure network equation. The security landscape is always changing and evolving at a rapid rate. Our customers face threats every day and need to respond to those threats at a moment’s notice. The pressure and demand to stay ahead…

March 27, 2019

SECURITY

Women Leading in Cyber – Welcome to WiCyS 2019

It’s time for the annual Women in Cyber Security Conference (WiCyS). We’re proud that Cisco is once again a VIP sponsor as well as a Founding Partner of this motivating and important event. We have some great activities in store, including welcoming eight high school girls and their two chaperones a…

March 25, 2019

SECURITY

The One-Two Punch of User and Device Trust

Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access…

March 14, 2019

SECURITY

Your money or your life: Digital extortion scams

There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from…

March 13, 2019

SECURITY

Hello World! Contextual Identity Within the Spacetime Continuum

Hello world! I think that’s the obligatory first line for any technology blog, right? But, how do you know I am here? How do you know I exist? I have a blog profile, I have a picture, I have a blog tagged to my name. All of these are contextual clues that I exist in reality, without actually being p…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security