Security

August 24, 2018

SECURITY

Secure Multi-Tenancy Part 2: Going Multi-Instance

Requirements Overview In the previous blog post, we went over the common requirements for partitioning a single physical security appliance into multiple virtual firewalls. We talked about how this logical separation brings a lot of complexity into environments where true data and management plane i…

August 23, 2018

SECURITY

Paying It Forward – Investing in Cybersecurity’s Future with Summer Camp

Solving the cybersecurity skills gap is difficult – but as an industry, we have a responsibility to educate the next generation who grew up with technology that wasn’t necessarily designed for security! In July, Cisco partnered with the Texas Advanced Computing Center (TACC), to host a cybersecurity…

August 22, 2018

SECURITY

Securing the Cloud: Assessing the Security of TLS

As more and more organizations move from self-hosted infrastructure to cloud-based environments, so too increases the demand to ensure that they are resilient and secure. As part of Cisco’s efforts to support our customers in making this change in a smooth and seamless fashion, we have been hard at…

August 21, 2018

SECURITY

Machine Learning: Beyond the buzzword

We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for some time. We have the experience, analytic skills, and collaboration skills that just aren’t there yet…

August 21, 2018

SECURITY

Streamlining Threat Investigations with AMP Unity

Preventing malware incidents is very much like preventing bad things from happening in our day-to-day life. We all take precautions every day (well, most of us do, anyway). Actions as simple as carrying an umbrella when rain is forecasted, buckling a safety belt when driving, or using sun screen whe…

August 14, 2018

SECURITY

Analyze This: Why Data Matters to Operational Success, Business Acceleration, and More

When you think of day-to-day operations, it’s usually about lowering costs and improving efficiency. Sure, there’s a need to have security and privacy controls, but at the operational level, is there a real desire to understand data—and make it work harder for you? In today’s competitive landscape,…

August 14, 2018

SECURITY

Security Automation: Putting the odds ever in your favor

Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…

August 14, 2018

SECURITY

How Umbrella’s global network puts you in the fast lane

It’s early Monday morning and you’re running late. You need to get to the office for an important meeting, but traffic is worse than usual. You check for alternate routes, but realize lots of other cars are doing just that, causing slowdowns at each turn. What if you had a way to take the fastest ro…

August 13, 2018

SECURITY

Promote Cloud Adoption in Education without Exposing Students to Risk

Cloud based collaboration is being adopted rapidly by organizations in all verticals, and education is no exception. Access to collaborative tools can’t be as simple as an on/off switch. School administrators need visibility to prevent the loss of sensitive data and to ensure that students aren’t en…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security