Security
NIAS 2018 Highlights
On the 18th of October, the NATO Information Assurance Symposium (NIAS) 2018 closed its conference doors. NIAS is the largest annual NATO cyber security conference. This event is a platform for uniting NATO global government leaders, and security experts across the NATO Alliance, industry, academia,…
Protecting Critical Infrastructure Networks with Zero Trust Segmentation
Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked operational technology. Further, critical infrastructure is often managed and deployed over connected systems supported or used by mobile professionals. At the same t…
A Required Cloud Native Security Mindset Shift
There has been a significant shift in the public cloud infrastructure offerings landscape in the last 3-5 years. With that shift we as Information Security practitioners must also fundamentally shift our tactics and view of how these new services can be leveraged as a whole new landscape of possible…
Endpoint Security – The Daunting Challenges of the Holiday Season
Turkey, Family, Gifts, Cookies, and…Malware? Wait, what? Make sure your Endpoint Security is up to the task during this holiday season! Fresh powder snow, home cooked meals, endless laughter, cookies near the fireplace, and the holiday spirit. Sure, maybe we’ll get some snow, some will get rain, and…
War Games: A WOPR of a Security Test (Part 3)
So how did the team get on in our War Game exercise? In order to complete the War Game exercise (the setup for which can be found in part 1 and part 2 of this series), our Security Advisory Services team determined that the following attack scenarios would need to be simulated: The plan A broad ta…
The Role of a Coach
This time of year, all five major sports leagues are “in season”. The raw emotion of competition and witnessing these finely tuned professional athletes overcome adversity to be the best in their fields can be exhilarating. While these athletes are the most dominant in the world at their craft, they…
Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes sense that when the bad guys find a reliable attack vector, like email phishing, they’ll use it for as long as it makes financi…
Five Questions to Ask About Your Data Privacy in the EU
Cisco Announces New EU Data Warehouse for Cisco Umbrella Data Storage Data privacy and how it impacts your company is likely top of your mind no matter where you are located. For EU companies, however, protecting customer data is now rule of law, and even your security solutions will need to comply…
Cisco Recognized as a Leader in Incident Response
It is never ideal to “go it alone” during a cybersecurity breach. Talk about a high-pressure situation. Getting access to experts is critical: with a strong support team, you’ll have more hands on deck so you can act quickly, and when you tap into skilled incident response experts, you have the ben…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security