Security

April 30, 2018

SECURITY

Top 5 Recommendations from Cisco Incident Response Engagements

Lately, there are days I wake up and find it hard to believe it’s been 3 years since we began our Incident Response (IR) practice within Cisco’s walls. Coming in on the ground floor of such a monumental and important offering to our customers gave us the unique opportunity to define and shape our pr…

April 30, 2018

SECURITY

DevSecOps: Lessons Learned

This is Part 4 in our Four Part DevSecOps Blog Series In Part 3 of our blog series DevSecOps: Automation for Assurance, we covered our automation journey to help us scale security across hundreds of development teams via our Continuous Security Buddy (CSB) capabilities. In the final blog of this ser…

April 27, 2018

SECURITY

Raise the Bar, Make an Impact, Put Security Above Everything

Cisco at RSA Conference 2018 At the RSA Conference (RSAC) 2018 last week, more attendees and exhibitors than ever before hit the streets of San Francisco. The annual gathering of security luminaries, leaders and practitioners attracted over 42,000 attendees and more than 600 exhibitors[1] making it…

April 26, 2018

SECURITY

Incident Response and General Data Protection Regulation

A new regulation is upon us. Set to take effect on May 25th, 2018, the General Data Protection Regulation (GDPR) is a new law implemented within the European Union (EU) to provide stronger protections for personally identifiable information collected, processed, and stored by business entities.   In…

April 26, 2018

SECURITY

Perspectives on Cryptomining

If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio to detect and protect against this new class of threat. We released a paper on illicit cryptomi…

April 24, 2018

SECURITY

Cisco Partners with Leading MDM/EMM Vendors to Secure Your iOS Devices

Remember when I mentioned that Cisco Security Connector has plans to expand their MDM/EMM integration capabilities? Well, I’m happy to report that we are doing just that. Last week, we announced that the Cisco Security Connector is now publicly available. This week, we are incredibly excited to shar…

April 19, 2018

SECURITY

Towards Backward-Compatible Post-Quantum Certificate Authentication

We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been focusing on quantum-resistant hash-based signatures for a few years now with LMS and SPHINCS+ and more. NIS…

April 19, 2018

SECURITY

The Cybersecurity Journey – Always Changing, Always Growing

I’m going to write a book called Organic Cyber Security. A career in this continually evolving field must be just that: organic. It has to become part of your daily practice! You need the right spark to get interested, learn the basics, and you’re off! That’s an especially important notion for women…

April 18, 2018

SECURITY

NSS Labs Awards Recommended Rating to Cisco Endpoint Security

In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as Cisco Advanced Malware Protection (AMP) for Endpoints has been lacking. Endpoint security…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security