Security

June 11, 2018

SECURITY

Data Privacy Makes Its Presence Known at Cisco Live 2018

I’m excited to be attending Cisco Live US in Orlando this week. We have a strong lineup of speakers and sessions, and lots of cool extras like hands-on labs, meet-the-expert conversations and social events. Of course, I’m most excited about engaging with customers who are interested in data privacy.…

June 8, 2018

SECURITY

3 Important Security Analytics Attributes. Hint: Machine Learning is Just One

Yes, with the growth in security vendors claiming to do Artificial Intelligence and Machine Learning, one might think it’s the ultimate answer to keeping organizations secure! It is definitely a rapidly evolving technology with many benefits. But while evaluating a security solution, it’s important…

June 8, 2018

SECURITY

Ready for takeoff into the era of direct internet access?

Buzz… I pull out my phone and see my pre-boarding reminder. I click the flight number pre-authorized and -populated in my ridesharing app. A car arrives minutes later, and the next thing I know my driver has pulled onto SFO’s tarmac. Directly in front of me, I see my plane’s boarding stairs ab…

June 6, 2018

SECURITY

The Importance of Logs

It’s funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational Security team aligning with platform and application support teams to build the projects the business wanted. Very soon after I joined it…

June 5, 2018

SECURITY

Why has Forrester’s Zero Trust Cybersecurity Framework become such a hot topic?

Let’s focus on the Zero Trust approach first. If your infrastructure was on the Internet, how would you design your organization’s cybersecurity framework? Authentication to confirm who logs into your infrastructure and multi factor authentication for your Admins? Would you encrypt everything? VPN…

June 5, 2018

SECURITY

It’s Time to Turn Your Access Control Perimeter into a Threat Control Perimeter

Your Security ‘Game Plan’: Is it Reactive or Proactive? In soccer, the name of the game is to play offensively rather than defensively. A good soccer team keeps the ball on the opponent’s side – and when it does penetrate those frontlines, the defensive players are prepared to fend off the threat. L…

June 1, 2018

SECURITY

Cisco and Downer Partnership Delivers First Smart Cities Project

Cisco and Downer have an ongoing strategic Internet of Things (IoT) partnership that was recently expanded to include Smart Cities. Downer, a diversified engineering and services company headquartered in Australia, in August of 2017, secured a contract to build out and, with the system owner, co-man…

May 28, 2018

SECURITY

Join Us for Capture-the-Flag at Cisco Live Orlando

Cisco Live! US will be here before you know it – in about a month, actually. Aside from the exciting keynotes, breakout sessions, labs, and the opportunities to get hands-on with our latest technologies and face-to-face with the people who help build them, we have a couple of introductions from the…

May 24, 2018

SECURITY

Why phishing attacks still win and what you can do about it, Part I

In the last few years we have seen a fundamental shift in malicious tactics leveraging social engineering techniques. Among the most effective of these are phishing attacks, where cybercriminals exploit a brand’s reputation to evade email security defenses and convince individuals to open an email a…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security