Security
The Next Netflix of the SD-WAN Blockbuster: Cisco SD-WAN Security
Much like Blockbuster Video, who paid a final late fee, most SD-WAN vendors will soon pay for ignoring the market’s demand for security integrated within their SD-WAN appliances. The video rental business was a thriving industry in the early 80s and Blockbuster Video was its undisputed leader. Throu…
Security Vigilance Never Rests: Moving to Active Threat Detection
Few things are as dynamic as cybersecurity. Modern networks have become increasingly sophisticated and complex. Today’s network extends to myriad devices fueled by a mobile workforce and more organizations are shifting workloads to the cloud as they move towards a more digitized future. A diversifyi…
Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach
The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called Continuous Adaptive Risk and Trust Assessment (aka. CARTA). These trust-centric approaches shift access decisions based on network topology to…
Cisco ISE – Playing Nice in the Security Ecosystem
By now you’ve likely heard of the benefits of Network Access Control (NAC) and specifically, Cisco Identity Services Engine (ISE). If not, it’s time to …how shall I put this… toss that clip-on pedometer in favor of a steps-capable smartwatch? Trade up that Motorola flip for a phone with an actual t…
Three ways to detect cryptomining activities using network security analytics
Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process by which new coins are created or earned. However, the one key aspect that separates your regular, everyday…
The Greatest Gap in Securing Critical Infrastructure
The Industrial Internet of Things (IIoT) promises transformational opportunities. Yet the open, standards-based internet technologies that enable the IIoT and economic innovation also present an array of complex challenges to critical infrastructure providers. Technology is being embedded into exist…
Cisco Threat Response: Open Source Integrations You Can Use Now
Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage threat intelligence and security context data in a single location. Over the next few months, our team will be work…
Threat Hunting for the Holidays
How to stop the ‘Grinch’ from breaking your endpoint defenses You’re gearing up for the holidays. But then your phone rings – it’s your manager. He just heard the news that another malware strain is on the loose. Just like the Grinch, it is a ‘mean one,’ posing a vicious threat to the security of co…
Black Hat Europe 2018
Warning from Black Hat NOC Cisco Security helped secure the Black Hat Europe 2018 Network Operations Centre (NOC) for the second year; joining conference producer UBM and its other security partners RSA Security, Palo Alto Networks, Rukus and Gigamon. Cisco provided DNS visibility and threat intelli…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
5