Security

July 2, 2018

SECURITY

Scaling Visibility and Security within the Operational Technology (OT) Environment

Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS, and malware detection (if you are lucky), but a soft interior leaving critical operational assets…

June 28, 2018

SECURITY

Demystifying: Machine Learning in Endpoint Security

Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation antivirus, fileless malware protection, threat hunting – the list goes on. The headlines can sound tempting…

June 26, 2018

SECURITY

Secure Your Mobile Connections with New IP Blocking Feature

When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable scenario: that game you were playing while waiting in line paused to present an advertisement, was it triggered by an IP address…

June 22, 2018

SECURITY

Cisco PSIRT Notice About Public Exploitation of the Cisco ASA Web Services Denial of Service Vulnerability

PSIRT has recently become aware of public exploitation of the Cisco Adaptive Security Appliance Web Services Denial of Service Vulnerability identified by Cisco bug ID CSCvi16029 and CVE ID CVE-2018-0296. With the security of our customers’ networks being a top priority, we’re taking act…

June 21, 2018

SECURITY

Secure your Endpoints Against Ransomware: Introducing Malicious Activity Protection

Dubbed by many as the “Year of Ransomware”, 2017 provided us with a very important and dangerous evolution to how these attacks make their way to your endpoints. The Cisco 2018 Annual Cybersecurity Report warns that “defenders should prepare to face new, self-propagating” attacks, like those we saw…

June 18, 2018

SECURITY

Thinking About a Cyber Career? Just Jump In

If you care about cyber security and you’re willing to work hard, we need you. Yes, YOU. The cybersecurity challenge is huge and there is a great need for people with diverse backgrounds to help solve it. Your path can originate in different places. For me, I didn’t start out intending to be a secur…

June 14, 2018

SECURITY

Cisco’s Process for Fixed Software Release and Vulnerability Disclosure

This blog was collaboratively written by Lou Ronnau, Scott Bradley, and Dan Maunz on the Cisco Customer Assurance Security Programs (CASP) team.  One of Cisco’s guiding principles is to protect the security of our customers’ networks, and our policies related to vulnerabilities in our products and s…

June 12, 2018

SECURITY

Cisco Stealthwatch and Cisco DNA Center bridge the SecOps – NetOps divide

By sheer necessity, there is an increasingly interdependent role between NetOps and SecOps in many enterprises. Cisco has been monitoring three trends: Networks are connecting ever more devices, locations and users. The complexity of managing them is creating openings for new threats. As advanced t…

June 11, 2018

SECURITY

10 minutes to value: Stealthwatch Cloud for Google Cloud Platform

Why did you adopt public cloud infrastructure? Most organizations use the cloud to be more responsive to market needs while also minimizing costs. Now it is time for security to embrace that philosophy. In partnership with Google, Cisco Stealthwatch Cloud can now deliver end-to-end visibility, robus…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security