Security
Top 5 Recommendations from Cisco Incident Response Engagements
Lately, there are days I wake up and find it hard to believe it’s been 3 years since we began our Incident Response (IR) practice within Cisco’s walls. Coming in on the ground floor of such a monumental and important offering to our customers gave us the unique opportunity to define and shape our pr…
DevSecOps: Lessons Learned
This is Part 4 in our Four Part DevSecOps Blog Series In Part 3 of our blog series DevSecOps: Automation for Assurance, we covered our automation journey to help us scale security across hundreds of development teams via our Continuous Security Buddy (CSB) capabilities. In the final blog of this ser…
Raise the Bar, Make an Impact, Put Security Above Everything
Cisco at RSA Conference 2018 At the RSA Conference (RSAC) 2018 last week, more attendees and exhibitors than ever before hit the streets of San Francisco. The annual gathering of security luminaries, leaders and practitioners attracted over 42,000 attendees and more than 600 exhibitors[1] making it…
Incident Response and General Data Protection Regulation
A new regulation is upon us. Set to take effect on May 25th, 2018, the General Data Protection Regulation (GDPR) is a new law implemented within the European Union (EU) to provide stronger protections for personally identifiable information collected, processed, and stored by business entities. In…
Perspectives on Cryptomining
If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio to detect and protect against this new class of threat. We released a paper on illicit cryptomi…
Cisco Partners with Leading MDM/EMM Vendors to Secure Your iOS Devices
Remember when I mentioned that Cisco Security Connector has plans to expand their MDM/EMM integration capabilities? Well, I’m happy to report that we are doing just that. Last week, we announced that the Cisco Security Connector is now publicly available. This week, we are incredibly excited to shar…
Towards Backward-Compatible Post-Quantum Certificate Authentication
We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been focusing on quantum-resistant hash-based signatures for a few years now with LMS and SPHINCS+ and more. NIS…
The Cybersecurity Journey – Always Changing, Always Growing
I’m going to write a book called Organic Cyber Security. A career in this continually evolving field must be just that: organic. It has to become part of your daily practice! You need the right spark to get interested, learn the basics, and you’re off! That’s an especially important notion for women…
NSS Labs Awards Recommended Rating to Cisco Endpoint Security
In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as Cisco Advanced Malware Protection (AMP) for Endpoints has been lacking. Endpoint security…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2