Security
Secure Multi-Tenancy Part 2: Going Multi-Instance
Requirements Overview In the previous blog post, we went over the common requirements for partitioning a single physical security appliance into multiple virtual firewalls. We talked about how this logical separation brings a lot of complexity into environments where true data and management plane i…
Paying It Forward – Investing in Cybersecurity’s Future with Summer Camp
Solving the cybersecurity skills gap is difficult – but as an industry, we have a responsibility to educate the next generation who grew up with technology that wasn’t necessarily designed for security! In July, Cisco partnered with the Texas Advanced Computing Center (TACC), to host a cybersecurity…
Securing the Cloud: Assessing the Security of TLS
As more and more organizations move from self-hosted infrastructure to cloud-based environments, so too increases the demand to ensure that they are resilient and secure. As part of Cisco’s efforts to support our customers in making this change in a smooth and seamless fashion, we have been hard at…
Machine Learning: Beyond the buzzword
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for some time. We have the experience, analytic skills, and collaboration skills that just aren’t there yet…
Streamlining Threat Investigations with AMP Unity
Preventing malware incidents is very much like preventing bad things from happening in our day-to-day life. We all take precautions every day (well, most of us do, anyway). Actions as simple as carrying an umbrella when rain is forecasted, buckling a safety belt when driving, or using sun screen whe…
Analyze This: Why Data Matters to Operational Success, Business Acceleration, and More
When you think of day-to-day operations, it’s usually about lowering costs and improving efficiency. Sure, there’s a need to have security and privacy controls, but at the operational level, is there a real desire to understand data—and make it work harder for you? In today’s competitive landscape,…
Security Automation: Putting the odds ever in your favor
Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…
How Umbrella’s global network puts you in the fast lane
It’s early Monday morning and you’re running late. You need to get to the office for an important meeting, but traffic is worse than usual. You check for alternate routes, but realize lots of other cars are doing just that, causing slowdowns at each turn. What if you had a way to take the fastest ro…
Promote Cloud Adoption in Education without Exposing Students to Risk
Cloud based collaboration is being adopted rapidly by organizations in all verticals, and education is no exception. Access to collaborative tools can’t be as simple as an on/off switch. School administrators need visibility to prevent the loss of sensitive data and to ensure that students aren’t en…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
7