Security

January 31, 2019

SECURITY

Why Business Leaders Should Care About Quantum Computing

In the tech sector, pundits are always hyping the next, disruptive technology on the verge of changing, well, everything. “Embrace this transformative new force or ignore it at your peril,” they warn. Sometimes, they even get it right. Quantum computing may very likely be one of those times. If you…

January 29, 2019

SECURITY

It’s 9am. Do you know where your data is?

‘Data center anywhere’ requires security everywhere It’s 9am. Do you know where your data is? If you’re like most businesses today, it’s everywhere. Your data center is no longer a physical place – it’s wherever your data is – on-premises, in SaaS-based applications, and in public clouds. In fact, G…

January 25, 2019

SECURITY

New Year, Same Reality: How Much Will Security Actually Change in 2019

If we look back at the security landscape of 2018, there were some interesting highs and lows.  There were a number of large-scale breaches in the news attributed to hackers, involving notable companies. All indications for 2019 don’t show any signs of this activity stopping or slowing down. In fact…

January 24, 2019

SECURITY

Data Privacy: A Business Imperative

Data Privacy is having a big year.  The General Data Protection Regulation (GDPR) became enforceable in May 2018, along with potential fines of up to 4% of gross revenue, and many countries have passed or updated their own privacy laws to align to the GDPR framework.  California passed a new privacy…

January 23, 2019

SECURITY

Suspicious Registry Keys and Requested files: A Threat Grid Case Study

Threat Grid’s detections and indicators are created by the Research and Efficacy Team, or RET. The RET’s primary objective is to improve the detection rate of Threat Grid. As such we have to keep up with new malware campaigns and exploitation techniques. This often requires manual analysis of sample…

January 18, 2019

SECURITY

Security Choice: Simpler Buying for more Effective Security

Security is difficult. Detecting and stopping constantly evolving attacks is a never-ending (and often thankless) challenge. And worse, the current state of security finds companies working with many products that don’t fit or work together.  Managing so many product consoles and alerts makes comple…

January 16, 2019

SECURITY

Securing the Central Hub of our World: Turkey

Cisco AMP and Cisco Umbrella Secures Istanbul Grand Airport and Turkish Airlines Turkey is a traveler’s and photographer’s dream. The diversity in culture and landscape paired with the generosity of its people makes this country extremely unique. Recently, there has been an increase in the number o…

January 14, 2019

SECURITY

Forrester’s Zero Trust or Gartner’s Lean Trust?

Zero trust is misnamed There’s been many management approaches that include the “Zero” term. In shipping, there was “Zero Inventory”. In manufacturing, there was “Zero Defects”. In environmental planning, there’s “Zero Waste”. So, it’s not surprising that the security industry has adopted “Zero Trus…

January 14, 2019

SECURITY

SMB and the return of the worm

Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one vector declines, another increases in popularity. Take network shares for instance—the technology that allows users to share files and f…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security