Security
Cracking the Code – How to Measure the Real Value of Information Security Management
Measuring the success and value of an information security organization is a perennial challenge across all industries. Consistently tracking the effectiveness of Information Security Management Systems (ISMS) is hard enough. Add to that C-level expectations for accurate metrics that equate to value…
The Role of Visibility in SecOps
The bad guys aren’t going away. In fact, they are getting smart, more creative, and just as determined to wreak havoc for profit as they have ever been. The good news is Security solutions and methodologies are getting better. Next Generation Firewalls, Malware Protection, and Access Control are…
Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster
Cisco Stealthwatch Cloud has the unique ability to provide an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. It really doesn’t matter where the cluster resides, whether on-premise or in any public cloud environment. Stealthwatch Cloud deploys as a d…
Know When to Have a Dedicated NGIPS vs. NGFW
With the ever-evolving threat of cyber-attacks, a network security solution requires unparalleled visibility and intelligence covering known and unknown threats for comprehensive protection. And with so many organizational responsibilities with different agendas, you need one consistent security en…
New Study Shows Correlating Network and Endpoint Data is Highly Manual
We recently commissioned Forrester Consulting to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint. Bringing together these two disparate threat vectors allows organizations to: Increase detectio…
Cognitive Intelligence: Empowering Security Analysts, Defeating Polymorphic Malware
Co-authored with: Jan Jusko, Harry Nayyar, and Danila Khikhlukha. In psychology, the term “cognition” refers to a human function that is involved in gaining knowledge and intelligence. It helps describe how people process information and how the treatment of this information may lead to various deci…
Jamf Pro now integrated with Cisco Security Connector
Cisco Security Connector 1.2.0 Released Cisco Security Connector is now integrated with Jamf Pro (formerly known as the Casper Suite). Designed to automate device management for the administrative team, while driving end-user productivity and creativity, Jamf Pro is a leading Enterprise Mobility Man…
Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States
SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions. SugarCreek’s authentic culinary expertise helps drive innovation. Their in-house expertise, in everything from food tre…
Why Organizations With Sensitive Research or Intellectual Property Need a Zero Trust Cybersecurity Framework Approach
The emergence of Zero Trust has shifted the center focus of some security frameworks from securing the perimeter to protecting sensitive data. While both are extremely important, this shift to a sensitive data-centric framework has advantages. To further understand the benefits of Zero Trust, consid…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security