Security

September 11, 2018

SECURITY

Cracking the Code – How to Measure the Real Value of Information Security Management

Measuring the success and value of an information security organization is a perennial challenge across all industries. Consistently tracking the effectiveness of Information Security Management Systems (ISMS) is hard enough. Add to that C-level expectations for accurate metrics that equate to value…

September 10, 2018

SECURITY

The Role of Visibility in SecOps

The bad guys aren’t going away.  In fact, they are getting smart, more creative, and just as determined to wreak havoc for profit as they have ever been.  The good news is Security solutions and methodologies are getting better.  Next Generation Firewalls, Malware Protection, and Access Control are…

September 6, 2018

SECURITY

Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster

Cisco Stealthwatch Cloud has the unique ability to provide an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. It really doesn’t matter where the cluster resides, whether on-premise or in any public cloud environment. Stealthwatch Cloud deploys as a d…

August 31, 2018

SECURITY

Know When to Have a Dedicated NGIPS vs. NGFW

With the ever-evolving threat of cyber-attacks, a network security solution requires unparalleled visibility and intelligence covering known and unknown threats for comprehensive protection.  And with so many organizational responsibilities with different agendas, you need one consistent security en…

August 29, 2018

SECURITY

New Study Shows Correlating Network and Endpoint Data is Highly Manual

We recently commissioned Forrester Consulting to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint. Bringing together these two disparate threat vectors allows organizations to: Increase detectio…

August 28, 2018

SECURITY

Cognitive Intelligence: Empowering Security Analysts, Defeating Polymorphic Malware

Co-authored with: Jan Jusko, Harry Nayyar, and Danila Khikhlukha. In psychology, the term “cognition” refers to a human function that is involved in gaining knowledge and intelligence. It helps describe how people process information and how the treatment of this information may lead to various deci…

August 27, 2018

SECURITY

Jamf Pro now integrated with Cisco Security Connector

Cisco Security Connector 1.2.0 Released Cisco Security Connector is now integrated with Jamf Pro (formerly known as the Casper Suite). Designed to automate device management for the administrative team, while driving end-user productivity and creativity, Jamf Pro is a leading Enterprise Mobility Man…

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions. SugarCreek’s authentic culinary expertise helps drive innovation. Their in-house expertise, in everything from food tre…

August 25, 2018

SECURITY

Why Organizations With Sensitive Research or Intellectual Property Need a Zero Trust Cybersecurity Framework Approach

The emergence of Zero Trust has shifted the center focus of some security frameworks from securing the perimeter to protecting sensitive data. While both are extremely important, this shift to a sensitive data-centric framework has advantages. To further understand the benefits of Zero Trust, consid…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security