Security

December 13, 2018

SECURITY

How Stealthwatch Cloud protects against the most critical Kubernetes vulnerability to-date, CVE-2018-1002105

The increasing popularity of traditional cloud computing technologies such as server-less, on-demand compute and containerized environments has made technologies like Kubernetes part of our daily vernacular as it relates to running our applications and workloads. Kubernetes solves many of the proble…

December 13, 2018

SECURITY

You’ve Got (Compromised) Mail!

There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with BEC. It’s happening all the time, in your company, right now. People are getting emails that look official, from a realistic company ema…

December 12, 2018

SECURITY

Nearly every threat is either on an endpoint, or it’s headed there

This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered the crown-jewel of your organization by the bad-guys. I’ve heard some people call the endpoint the new perime…

December 11, 2018

SECURITY

Cryptomining: A sheep or a wolf?

One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to convince them there are problems with their computers, or point-of-sale Trojan horses siphoning off credit ca…

December 11, 2018

SECURITY

Know Your Boundaries To Know your Strategy

Has your organization initiated a risk assessment and created a threat model that would have covered some of the following incidents over the last two years? The local branch of a shipping company updates the accounting application that is dominant in their region. With the updated application, they…

December 10, 2018

SECURITY

From Beginning to Endpoint: Covering All the Angles

For the myriad ways that an endpoint could be exploited, there’s just no way that a single technology will provide comprehensive protection. Without the visibility of your entire threat landscape and without the control to detect, block, and remediate an attack, you’re at an unfair disadvantage in p…

December 9, 2018

SECURITY

Cisco’s DoD accreditation puts you on the forefront of cybersecurity

The U.S. Department of Defense (DoD) has approved the Cisco Certified Network Associate (CCNA) Cyber Ops certification program for anyone who works in a Cyber Security Service Provider (CSSP) analyst or incident responder role. Cybersecurity provides the critical foundation organizations require to…

December 8, 2018

SECURITY

A Dedicated Session for CISOs at Cisco Live 2019

January 17, 2019 Update: Registrations for CISO Day are now closed. Please visit our Security Track page here to learn about our security sessions and other events at Cisco Live Barcelona.   87% of companies across Europe, Middle East and Africa admitted they have suffered a cyber attack in the…

December 7, 2018

SECURITY

The KISS Principle for Successful Expansion into the Cloud: Keep It Simple and Secure

As the calendar turns to 2019 in a matter of weeks we will be bombarded with a series of new predictions and resolutions. We had the same barrage last year, including this one on what CEOs mandate to their CIOs:  IT must do everything it can to help businesses reach revenue ambitious growth goals I…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security