Security
Don’t Feed the Phish: Implementing DMARC
The Challenge of implementing SPF and DKIM It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not been widely adopted. However, organizations must take advantage of them to tackle two of the most pressing email securi…
Using machine learning to target threats
This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during their walk in the forest. Surprised, they both start running for their lives, but then one of them stops to put on his running shoes. His buddy says, “Wh…
How Panaseer is Leading the Way in Cyber Hygiene for Enterprise Security
The recent data breaches at Equifax, Uber, Deloitte and Yahoo, are an indication of the ever-growing sophistication of hackers and cyberattacks. If this trend continues, breaches could be bigger, hackers smarter, and security teams more vulnerable. Prevention is better than cure Defining and impleme…
Encrypted Botnets and cryptomining spotted at Cisco Live
More than 25,000 attendees visited Cisco Live in Orlando this year. While this large concentration of network and security professionals was learning about our latest innovations, Cisco Security was busy catching bad guys! Of course we protect our own show, but this year was special… More than 170 c…
Ransomware: Are you ready?
Don’t let an attack sideline your business. Ransomware is a lot more than the buzzword du jour. Attacks like WannaCry and Nyetya affected thousands of organizations around the world and cost billions of dollars in damages. While data theft and other types of attacks are very destructive, ransomware…
Demystifying: Next-Generation Endpoint Security
The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Since we see the term so often, it’s easy to gloss over without giving it much thought. Next-generation pretty obviously implies that the product you’re purchasing today is better than the ve…
Redefining Data Center Security: Deliver Effective Workload Protection in a Multicloud World
For most businesses, the rapidly changing nature of the modern data center poses a significant security challenge. The data center remains the heart of digital enterprises, and IT departments are looking for solutions to make the data center accessible anytime, anywhere. At Cisco, we have redefined…
Moving Towards The Zero Trust Cybersecurity Framework?
The first step should be an investigation and analysis of what your sensitive data is, where it lives, and who accesses it. Then analyze the three Foundational Pillars (see below) to see where you are with the necessary people, process, and technology basics. Most organizations should leverage the r…
Value Chain Security: The Ultimate Team Sport
In a world of increasingly “extreme” sports, I offer the premise that security in a connected world is truly the most extreme team sport of all. Why? Because while it demands a tightly aligned team, often we do not even know who or what is part of our team. In order to reach the goal of security in…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
3