Security
Today’s critical threats: A Cisco Security threat report
For more than a decade, Cisco’s security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organizational implications. Today we are…
Cisco at RSA Conference 2019 – Making security better
Over the past several years, cybersecurity has moved from uber techies into the mainstream. When the Olympics can be disrupted by highly targeted malware, and ransomware has grown to be above a billion dollars, we’ve clearly reached a critical turning point. Not to mention the fact that whole countr…
Can your firewall do that?
Part 1: Prevent breaches automatically to keep your business moving At Cisco, we’re constantly talking with executives and IT leaders about cybersecurity. They’re concerned – they want to know how to protect their company, their employees, and their customers. But three primary concerns always seem…
So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: “We need a SOC.” My last post on this topic focused on the operational considerations. Now le…
Cisco Stealthwatch product updates – enhanced security analytics, context-aware mitigation, better control, easier man …
We are very excited to announce the new features of Cisco Stealthwatch! With release 7.0, we are introducing significant enhancements for the Stealthwatch administrator and the security analyst to detect and respond to threats faster, and manage the tool more efficiently. Enhanced security analytics…
Sign up for the Security Operations Center Tour at RSA Conference 2019
Free Expo-only Passes for RSA Conference 2019 The Security Operations Center (SOC) returns for RSA Conference 2019. You can register now for your free tour of the RSA Conference SOC, where engineers are monitoring traffic on the Moscone Wireless Network for security threats. The SOC is sponsored by…
A Rising Tide: Why We All Need Data Privacy Laws
Billions of connections are made online every single day—at work, at home, and at play. What’s the common thread linking all these connections and the people making them? Data. Lots and lots of data. For our customers, it’s not just any data, though—it’s data that describes employees and their custo…
So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: “We need a SOC.” Building a SOC doesn’t present a problem for Cisco’ Security Advi…
Protecting Cisco AnyConnect VPN & Cloud Applications With Duo’s MFA
This blog post is the first in a three-part series on how Duo’s MFA integrates with Cisco AnyConnect VPN. Organizations are facing a major technology shift. They’re in the process of moving many of their on-premises workloads and applications to the cloud. But the transition to cloud isn’t as simple…
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171458-Screen-Shot-2020-01-17-at-12.13.39-PM-150x150.png)
Why Cisco Security?
Explore our Products & Services
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171933-Screen-Shot-2020-01-17-at-12.14.33-PM-150x150.png)
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2