Security
Data Privacy Makes Its Presence Known at Cisco Live 2018
I’m excited to be attending Cisco Live US in Orlando this week. We have a strong lineup of speakers and sessions, and lots of cool extras like hands-on labs, meet-the-expert conversations and social events. Of course, I’m most excited about engaging with customers who are interested in data privacy.…
3 Important Security Analytics Attributes. Hint: Machine Learning is Just One
Yes, with the growth in security vendors claiming to do Artificial Intelligence and Machine Learning, one might think it’s the ultimate answer to keeping organizations secure! It is definitely a rapidly evolving technology with many benefits. But while evaluating a security solution, it’s important…
Ready for takeoff into the era of direct internet access?
Buzz… I pull out my phone and see my pre-boarding reminder. I click the flight number pre-authorized and -populated in my ridesharing app. A car arrives minutes later, and the next thing I know my driver has pulled onto SFO’s tarmac. Directly in front of me, I see my plane’s boarding stairs ab…
The Importance of Logs
It’s funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational Security team aligning with platform and application support teams to build the projects the business wanted. Very soon after I joined it…
Why has Forrester’s Zero Trust Cybersecurity Framework become such a hot topic?
Let’s focus on the Zero Trust approach first. If your infrastructure was on the Internet, how would you design your organization’s cybersecurity framework? Authentication to confirm who logs into your infrastructure and multi factor authentication for your Admins? Would you encrypt everything? VPN…
It’s Time to Turn Your Access Control Perimeter into a Threat Control Perimeter
Your Security ‘Game Plan’: Is it Reactive or Proactive? In soccer, the name of the game is to play offensively rather than defensively. A good soccer team keeps the ball on the opponent’s side – and when it does penetrate those frontlines, the defensive players are prepared to fend off the threat. L…
Cisco and Downer Partnership Delivers First Smart Cities Project
Cisco and Downer have an ongoing strategic Internet of Things (IoT) partnership that was recently expanded to include Smart Cities. Downer, a diversified engineering and services company headquartered in Australia, in August of 2017, secured a contract to build out and, with the system owner, co-man…
Join Us for Capture-the-Flag at Cisco Live Orlando
Cisco Live! US will be here before you know it – in about a month, actually. Aside from the exciting keynotes, breakout sessions, labs, and the opportunities to get hands-on with our latest technologies and face-to-face with the people who help build them, we have a couple of introductions from the…
Why phishing attacks still win and what you can do about it, Part I
In the last few years we have seen a fundamental shift in malicious tactics leveraging social engineering techniques. Among the most effective of these are phishing attacks, where cybercriminals exploit a brand’s reputation to evade email security defenses and convince individuals to open an email a…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security