Security
As Encrypted Malicious Web Traffic Increases, Defenders Need Advanced Tools That Provide Visibility
Defenders face two significant challenges in today’s complex threat landscape. First, the number and variety of malware types and families are increasing—so much so that automation of detection and response efforts is now a must. Second, the volume of encrypted web traffic—both legitimate and malici…
IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution
Update: 4/11 we have corrected the detection to Ursnif/Dreambot This post was authored by Ross Gibb with research contributions from Daphne Galme, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner. Cisco has noticed an increase in infections by the banking trojan IcedID t…
Cisco at RSAC 2018: It’s Time to Put Security Above Everything
There will be more than 700 vendors on the show floor at RSA Conference. Cool, right? Yes – and no. Competition breeds innovation, which is needed to fight the bad guys. However, using products from multiple vendors creates unforeseen security challenges – the very challenges our products were…
Encrypted Traffic Analytics Receives “Miercom Performance Verified” Certification
Encryption is becoming an increasingly prevalent aspect of digital communications – even when it comes to malware. A Cisco analysis of more than 400,000 malicious binaries found that about 70 percent had used at least some encryption to evade detection as of October 2017. Decrypting this traffic for…
ISE: Transforming your siloed security apparatuses into a cohesive security network
A long time ago, when I was a CISO at a large Service Provider, I was ingrained early and often about the concept of “security rings”. Unlike the common belief among younger information security professionals, the term “security ring” was coined not by information security people, but instead by phy…
Sign up for the Security Operations Center Tour at RSA Conference 2018
Free Expo-only Passes for RSA Conference 2018 The Security Operations Center (SOC) returns for RSA Conference 2018. You can register now for your free tour of the RSA Conference SOC, where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored…
March 2018 Cisco IOS and IOS XE Software Bundled Publication
Today, we released the first Cisco IOS and IOS XE Software Security Advisory Bundled Publication of 2018. As a reminder, Cisco discloses vulnerabilities in Cisco IOS Software and Cisco IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year. Today’…
Cisco Welcomes Women at RSA, and in Our Cyber Workforce
Becoming the #1 security company is a tall order. At Cisco, we know that diversity will be our competitive differentiator in attaining that goal. Women bring so much to the security table, offering different perspectives that yield strategic and creative solutions to complex problems that cyber thre…
The Fast Pace of Change
Rethinking Secure Technical Innovation to Enable Successful Business Outcomes Over the past 25 years I have been employed in the technology field, my non-technical friends often ask me, “How do you keep up with technology as things change so quickly?” I argue that change isn’t as dramatic as they m…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2