Security

March 4, 2019

SECURITY

Cisco Stealthwatch Cloud and Microsoft Azure: reliable cloud infrastructure meets comprehensive cloud security

Isn’t it great when the enterprise technology solutions you use to achieve various business outcomes partner and work seamlessly with each other? Cisco and Microsoft have done just that to provide you with a scalable and high-performance cloud infrastructure along with easy and effective cloud secur…

March 3, 2019

SECURITY

5 Cybersecurity Trends to Watch

As we are about to enter another RSA conference, it is a good time to reflect on what changes we are seeing in the cybersecurity space. Between now and RSA 2020, here are five trends that I expect to see rise to the top. 1. New world application security takes off.  There is a traditional way of thi…

March 2, 2019

SECURITY

Three New Integrations for AMP for Endpoints with IBM Security

IBM and Cisco Security continue to work together to deliver advanced integrations, resulting in improved network visibility and faster threat detection and response. We recently released two new integrations with Cisco AMP for Endpoints (AMP4EP) for IBM QRadar Security Intelligence Platform and for…

February 28, 2019

SECURITY

Happy Birthday, Threat Response: Only a year old, but boy have you seen some things!

Cisco Threat Response: For security analysts, by one of their own The work of a security analyst is arduous and time consuming but rewarding too. I know, I spent a good part of my career sitting in a seat, investigating and responding to threats in a Security Operations Center (SOC). I spent way too…

February 28, 2019

SECURITY

Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study

Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world. With over 3200 respondents across 18 countries, the study offers a solid view of what’s on the minds and to-do lists of…

February 27, 2019

SECURITY

The Zero Trust Games are here!

Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight f…

February 27, 2019

SECURITY

Cisco Security at Work: Threatwall at Mobile World Congress 2019

If you attended a Cisco Live or an RSA conference in the past couple of years you may have come across a display entitled “Cisco Security at Work”. This display, often referred to as the Threatwall, is a live display of threats on the wireless network at the conferences where it is deployed. Current…

February 26, 2019

SECURITY

Can your firewall do that?

Part 2: Visibility to detect and stop threats fast In my last post, we explored how a firewall should be using top-notch threat intelligence, sound security policy, and features like intrusion prevention to pre-emptively stop threats before they can embed themselves in your network. These preventive…

February 22, 2019

SECURITY

Malicious Cryptomining is Exploding. Are you at risk?

Cryptocurrency is making it easier for hackers to get paid while protecting their anonymity. Malicious cryptomining is on the rise – moving more mainstream, and as a result, more profitable than ever. And the market volatility of cryptocurrency makes this emerging threat more financially lucra…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security