Security

July 17, 2018

SECURITY

Easily detect threats and risks for Google Cloud Platform

According the Cisco 2018 Annual Cybersecurity Report, 40 percent of the dynamic networks, endpoints, and cloud infrastructure in enterprises is leading to significant blind spots and lack of real-time awareness for security teams. In addition, 53 percent of organizations host at least half of their…

July 17, 2018

SECURITY

Security Multi-Tenancy Part 1: Defining the Problem

Pre-Virtual Virtual Firewalls Nowadays, everyone likes to talk about network function virtualization. Most security vendors build their firewall products to run on a few popular hypervisors. However, the “virtual firewall” term predates this virtualization craze. Many firewall administrators use thi…

July 13, 2018

SECURITY

Cisco Security Connector Expands EMM/UEM Integrations with VMware Workspace ONE On-Premises

VMware Workspace ONE (previously known as AirWatch) has been the driving force within the mobile device management space. Their technology has changed the way businesses mobilize their workforce by providing greater management and control capabilities. As an industry leader who understands the secur…

July 11, 2018

SECURITY

Security with Privacy – Solving the encryption problem without decryption

With the rise of encrypted traffic, it is becoming extremely resource intensive for organisations to decrypt traffic for security use cases. And with increasing adoption of TLS 1.3 and privacy-oriented TLS mechanisms like certificate pinning (HPKP), decryption using man in the middle (MITM) techniqu…

July 9, 2018

SECURITY

Transparency and the CLOUD Act: The Importance of Evolving Transparency Reports

As organizations navigate the rapid and constant change of digital transformation, they look for vendors who can deliver and partners they can trust to guide them on the journey. Transparency is undoubtedly one of the most critical aspects to building customer relationships and trust in the digital…

July 9, 2018

SECURITY

Putting the “Active” Back in Proactive Security: Tabletop Exercises

As security practitioners, we have the seemingly impossible task of defending an ever-changing environment. It seems like every time we get close to compliance, new vulnerabilities and threat vectors are discovered. So, we continually practice and plan, knowing that we have to be right all the time,…

July 6, 2018

SECURITY

Protecting against the latest LTE network attacks

Recently, researchers have uncovered new attacks against the Long-Term Evolution (LTE) network protocol. LTE, a type of 4G network, is a mobile communications standard used by billions of devices around the world. Security researchers from Ruhr-Universität Bochum and New York University Abu Dhabi di…

July 5, 2018

SECURITY

Service Provider Digital Transformation and Security

For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the new technologies or in the process of early adoption and implementation–with a majority just beginning t…

July 3, 2018

SECURITY

Cisco Visibility Casebooks: Saving You Time When You Need It Most

Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage. They sift through threat intelligence information from multiple sources and event logs from multiple devices to de…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security