Security
Security Operations Track: the session for security professionals at Cisco Live
January 17, 2019 Update: Registrations for Security Operation Track are now closed. Please visit our Security Track page here to learn about our security sessions and other events at Cisco Live Barcelona. 87% of companies across Europe, Middle East and Africa admitted they have suffered a cyb…
Making Data Work for Businesses and Citizens with Data Curation and Sound Data Privacy Practices
Interest in data privacy has never been higher on the heels of the EU’s General Data Protection Regulation (GDPR) and a constant rash of serious data privacy breaches making the news. The trend will continue, and it’s important for everyone to understand that the lens through which we view data priv…
Improve network and security operations with Firepower multi-instance and Cisco Threat Response
As one of the largest security companies in the world, we take great pride in building solutions that many thousands of organizations trust to secure their networks. Small businesses and large enterprises alike rely on Cisco firewalls to keep their organizations running. With our latest release, Fir…
Defeating Polymorphic Malware with Cognitive Intelligence. Part 3: Static Analysis
Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with data analysis skills to automate threat hunts. But what does it really take to build a scalabl…
Compromise Assessment vs Threat Hunting
While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco Incident Response Readiness & Retainer service. Whether your organization has recently gone through a merger or acquisit…
Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products
Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been a process like a melody that ties in all other parts of the song. Staying on this musical analogy, if process is the melody, and you conside…
AMP for Endpoints Updates: Fall 2018
Written by Evgeny Mirolyubov, Ben Greenbaum, Jesse Munos on behalf of the AMP for Endpoints engineering and research team The AMP for Endpoints engineering and research team continuously releases new features and capabilities in the AMP for Endpoints Console with the goal of providing a superior use…
Securing Access to Our Nation’s Critical Infrastructure
It’s Critical Infrastructure Security and Resilience Month, but I think we can all agree that the topic at hand is, uh, more of a long-term necessity. About 85 percent of the nation’s critical infrastructures are privately owned and operated, as cited in NIST’s SP 800-82 Guide to I…
A new way to think about security in AWS
Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and access management, granular activity logs, and strong policy enforcement. Howe…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security