Security

April 18, 2018

SECURITY

Imagine Our Collective Impact on Cybersecurity

I just had a heart-to-heart talk with a few thousand of my fellow security professionals at the RSA Conference. We had a lot to discuss. As I walked off the stage, I was thinking about all of the people in our industry who weren’t in attendance, and all those who aren’t in our industry, yet still sh…

April 18, 2018

SECURITY

Step Up Your Mobile Security Game with Cisco Security Connector

The alarm on your phone goes off at 6:00 AM. You smash the snooze button and fall back asleep for another 15 minutes. The alarm rings again and now it’s time to start the day. What’s the first thing you do? You pick up your phone on your nightstand and skim through your emails and meetings. From the…

April 17, 2018

SECURITY

Send Cryptojacking Packing

Although the cryptocurrency market may have lost ~70% of market cap from a high of $835B, it hasn’t stopped malicious actors, ravenous for the next bull run, from mining cryptocurrency. The birth of cryptocurrency has altered the threat landscape making it easier for malicious actors to get paid and…

April 12, 2018

SECURITY

Secure Data Centers: When the Best Advice is to Get the Best Advice

The data center of today is dynamic yet complex. The constant evolution of new infrastructure, applications, distributed systems, and users has made the demands on the data center acute. Add to that the heightened need for security. No matter where the data center is hosted, mission critical informa…

April 11, 2018

SECURITY

Protecting against crypto mining and malware

It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious macro. Attackers also continue hiding malware in email attachments. It’s safe to assume that the…

April 11, 2018

SECURITY

TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back

Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero trust.  The bad news is that threat actors are also benefiting from pervasive encr…

April 11, 2018

SECURITY

3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy

We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark Study. In the 2017 study, 27 percent of security professionals said they are using off-premises private clouds, compared with 25 p…

April 10, 2018

SECURITY

Leveraging Cloud Environments for Security and Speed

The benefits and challenges of the new normal In the Pacific Northwest, the weather, especially in the spring, can be pretty variable. Just look at this tweet from the National Weather Service in Seattle: Living in Seattle, I can tell you with authority that cloudy days are the norm most of the yea…

April 9, 2018

SECURITY

See and respond in time to those pesky threats that cross the perimeter

If someone were to ask you if your network is secure, can you confidently say ‘yes’? Because that would mean you have a way to know if there’s been an APT (Advanced Persistent Threat) attack, if hackers have managed to steal credentials and gain access, or even if there’s an employee accessing criti…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security