Security
Imagine Our Collective Impact on Cybersecurity
I just had a heart-to-heart talk with a few thousand of my fellow security professionals at the RSA Conference. We had a lot to discuss. As I walked off the stage, I was thinking about all of the people in our industry who weren’t in attendance, and all those who aren’t in our industry, yet still sh…
Step Up Your Mobile Security Game with Cisco Security Connector
The alarm on your phone goes off at 6:00 AM. You smash the snooze button and fall back asleep for another 15 minutes. The alarm rings again and now it’s time to start the day. What’s the first thing you do? You pick up your phone on your nightstand and skim through your emails and meetings. From the…
Send Cryptojacking Packing
Although the cryptocurrency market may have lost ~70% of market cap from a high of $835B, it hasn’t stopped malicious actors, ravenous for the next bull run, from mining cryptocurrency. The birth of cryptocurrency has altered the threat landscape making it easier for malicious actors to get paid and…
Secure Data Centers: When the Best Advice is to Get the Best Advice
The data center of today is dynamic yet complex. The constant evolution of new infrastructure, applications, distributed systems, and users has made the demands on the data center acute. Add to that the heightened need for security. No matter where the data center is hosted, mission critical informa…
Protecting against crypto mining and malware
It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious macro. Attackers also continue hiding malware in email attachments. It’s safe to assume that the…
TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back
Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero trust. The bad news is that threat actors are also benefiting from pervasive encr…
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark Study. In the 2017 study, 27 percent of security professionals said they are using off-premises private clouds, compared with 25 p…
Leveraging Cloud Environments for Security and Speed
The benefits and challenges of the new normal In the Pacific Northwest, the weather, especially in the spring, can be pretty variable. Just look at this tweet from the National Weather Service in Seattle: Living in Seattle, I can tell you with authority that cloudy days are the norm most of the yea…
See and respond in time to those pesky threats that cross the perimeter
If someone were to ask you if your network is secure, can you confidently say ‘yes’? Because that would mean you have a way to know if there’s been an APT (Advanced Persistent Threat) attack, if hackers have managed to steal credentials and gain access, or even if there’s an employee accessing criti…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
3