Security
Secure Access to Any Application With Duo Security
Over the past decade, several trends have broadly influenced the way businesses provide users access to applications and services. These trends include the wide adoption of: Mobile devices Cloud services (SaaS and IaaS) Accessing applications from anywhere As businesses have transformed to a multi…
War Games: A WOPR of a Security Test (Part 2)
In part 1 of this series of posts, we covered what constituted a War Game and how we defined the various attack scenarios. In this part, we will cover our Cisco Security Advisory Services team used these scenarios to develop real world threat models and establish other parameters of the engagement.…
Layers of Security
Do you remember the movie “Die Hard”? Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into Security best practices. Before we go into that, let’s recap. The bad guys in the movie were going to steal $640M in bearer bonds. In order to do so, they nee…
Tackling the Growing Threat Landscape of ICS and the IIoT
It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether or not a device or sensor is digitally connected. Today’s focus must be on who has access to the operatio…
Using Threat Intelligence Effectively in Security Automation and Orchestration with DFLabs and Cisco Security
Written in collaboration with John Moran, Senior Product Manager, DFLabs When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset. More often, it is a single indicator or security alert which provides the first inkling that something i…
War Games: A WOPR of a Security Test (Part 1)
Recently, in what was an interesting change to the usual technical and risk/compliance focused consultancy, our Security Advisory Services carried out a War Games exercise – which is similar in style to a “red team” engagement. This short series of posts aims to describe the experi…
Why ISE Continues to Win
Frost and Sullivan recently announced Cisco Identity Services Engine (ISE) won their 2018 NAC Market Leadership Award. The importance of Network Access Control (NAC) is actually growing, with a compound annual growth rate of 23.7 percent, according to Frost and Sullivan. We at Cisco certainly see th…
Disruption on High: Managing Cyber Risk in a Multicloud World
Digital transformation is happening and with it comes the pain of disruption. For many organizations around the world, it looks like this: your workforce is increasingly mobile, employees are using a variety of devices to access your network, and utilizing potentially an unknown amount of cloud serv…
Employees: Your Greatest Security Asset
As a CISO, I’m focused on the security of Cisco’s entire enterprise, not just our IT systems and infrastructure or the data our customers entrust in us. Because Cisco is a leading security technology provider, my team and I are fortunate to have the best tools to help prevent, detect and remediate c…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
1