Security

October 28, 2018

SECURITY

Secure Access to Any Application With Duo Security

Over the past decade, several trends have broadly influenced the way businesses provide users access to applications and services. These trends include the wide adoption of: Mobile devices Cloud services (SaaS and IaaS) Accessing applications from anywhere As businesses have transformed to a multi…

October 27, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 2)

In part 1 of this series of posts, we covered what constituted a War Game and how we defined the various attack scenarios. In this part, we will cover our Cisco Security Advisory Services team used these scenarios to develop real world threat models and establish other parameters of the engagement.…

October 26, 2018

SECURITY

Layers of Security

Do you remember the movie “Die Hard”?  Arguably the best Christmas movie ever.  All kidding aside, this movie has a great correlation into Security best practices.  Before we go into that, let’s recap.  The bad guys in the movie were going to steal $640M in bearer bonds.  In order to do so, they nee…

October 24, 2018

SECURITY

Tackling the Growing Threat Landscape of ICS and the IIoT

It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether or not a device or sensor is digitally connected. Today’s focus must be on who has access to the operatio…

October 23, 2018

SECURITY

Using Threat Intelligence Effectively in Security Automation and Orchestration with DFLabs and Cisco Security

Written in collaboration with John Moran, Senior Product Manager, DFLabs When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset. More often, it is a single indicator or security alert which provides the first inkling that something i…

October 20, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 1)

Recently, in what was an interesting change to the usual technical and risk/compliance focused consultancy, our Security Advisory Services carried out a War Games exercise – which is similar in style to a “red team” engagement. This short series of posts aims to describe the experi…

October 16, 2018

SECURITY

Why ISE Continues to Win

Frost and Sullivan recently announced Cisco Identity Services Engine (ISE) won their 2018 NAC Market Leadership Award. The importance of Network Access Control (NAC) is actually growing, with a compound annual growth rate of 23.7 percent, according to Frost and Sullivan. We at Cisco certainly see th…

October 15, 2018

SECURITY

Disruption on High: Managing Cyber Risk in a Multicloud World

Digital transformation is happening and with it comes the pain of disruption. For many organizations around the world, it looks like this: your workforce is increasingly mobile, employees are using a variety of devices to access your network, and utilizing potentially an unknown amount of cloud serv…

October 15, 2018

SECURITY

Employees: Your Greatest Security Asset

As a CISO, I’m focused on the security of Cisco’s entire enterprise, not just our IT systems and infrastructure or the data our customers entrust in us. Because Cisco is a leading security technology provider, my team and I are fortunate to have the best tools to help prevent, detect and remediate c…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security