Security
Scaling Visibility and Security within the Operational Technology (OT) Environment
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS, and malware detection (if you are lucky), but a soft interior leaving critical operational assets…
Demystifying: Machine Learning in Endpoint Security
Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation antivirus, fileless malware protection, threat hunting – the list goes on. The headlines can sound tempting…
Secure Your Mobile Connections with New IP Blocking Feature
When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable scenario: that game you were playing while waiting in line paused to present an advertisement, was it triggered by an IP address…
Cisco PSIRT Notice About Public Exploitation of the Cisco ASA Web Services Denial of Service Vulnerability
PSIRT has recently become aware of public exploitation of the Cisco Adaptive Security Appliance Web Services Denial of Service Vulnerability identified by Cisco bug ID CSCvi16029 and CVE ID CVE-2018-0296. With the security of our customers’ networks being a top priority, we’re taking act…
Secure your Endpoints Against Ransomware: Introducing Malicious Activity Protection
Dubbed by many as the “Year of Ransomware”, 2017 provided us with a very important and dangerous evolution to how these attacks make their way to your endpoints. The Cisco 2018 Annual Cybersecurity Report warns that “defenders should prepare to face new, self-propagating” attacks, like those we saw…
Thinking About a Cyber Career? Just Jump In
If you care about cyber security and you’re willing to work hard, we need you. Yes, YOU. The cybersecurity challenge is huge and there is a great need for people with diverse backgrounds to help solve it. Your path can originate in different places. For me, I didn’t start out intending to be a secur…
Cisco’s Process for Fixed Software Release and Vulnerability Disclosure
This blog was collaboratively written by Lou Ronnau, Scott Bradley, and Dan Maunz on the Cisco Customer Assurance Security Programs (CASP) team. One of Cisco’s guiding principles is to protect the security of our customers’ networks, and our policies related to vulnerabilities in our products and s…
Cisco Stealthwatch and Cisco DNA Center bridge the SecOps – NetOps divide
By sheer necessity, there is an increasingly interdependent role between NetOps and SecOps in many enterprises. Cisco has been monitoring three trends: Networks are connecting ever more devices, locations and users. The complexity of managing them is creating openings for new threats. As advanced t…
10 minutes to value: Stealthwatch Cloud for Google Cloud Platform
Why did you adopt public cloud infrastructure? Most organizations use the cloud to be more responsive to market needs while also minimizing costs. Now it is time for security to embrace that philosophy. In partnership with Google, Cisco Stealthwatch Cloud can now deliver end-to-end visibility, robus…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
1