Security
How to Overcome Privacy Program Stumbling Blocks
The need to have a strong data privacy and protection plan continues to heat up. The more we share, the more market researchers gather information on their consumers, the more vigilant we need to be on our privacy programs and compliance. Guidance on creating a privacy program can seem pretty straig…
Protecting your Public Cloud after Meltdown and Spectre
In early January, researchers unveiled several major security vulnerabilities. Dubbed Meltdown and Spectre, these two vulnerabilities pertained to a hardware flaw in CPUs, including Intel, Qualcomm, and ARM processors. Through a complicated series of exploits targeting “speculative execution,” an op…
The Role of Transparency in our Digital Economy
It’s no surprise the world is going digital. With this transition comes the opportunity for economic growth, job creation and global competitiveness but also the risk of cyber-attacks for monetary or political gain, and disruption of service. In conversations with customers all over the world, it’s…
Understanding the Attack Vectors of CVE-2018-0101 – Cisco ASA Remote Code Execution and Denial of Service Vulnerabilit …
Cisco is committed to responsible coordinated disclosure about vulnerabilities, and maintains a very open relationship with the security research community. On January 29, 2018, the Cisco PSIRT learned about public knowledge of a remote code execution and denial of service vulnerability affecting th…
An Industry-First: A Better Framework for Cyber Risk
Let’s start with something we all know by now: cyber risk is real. And as our reliance on technology in the workplace increases, bad actors will look for opportunities to exploit it. As we have seen from headlines over the past few years, ransomware is becoming more pervasive, and the most prominent…
TLS 1.3 and Forward Secrecy: Count Us In, and Here’s Why
The damage a hacker can do after discovering a server’s private encryption key is about to shrink considerably. That’s thanks to important improvements in the coming Internet Engineering Task Force (IETF) Transport Layer Security (TLS) standard for Internet security. Notably, while prior versions ha…
Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis
In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a minor incident and making the news. In order to be effective, security teams need to be able to quickly access data, ga…
The new face of Threat Grid for 2018
The Threat Grid team is always working on improvements to our leading malware analysis and threat intelligence platform. In the latter part of 2017 and into early 2018, the team has released a number of improvements to the User Interface (UI) and workflow, making sure that customers can get to the s…
Network Visibility for Mergers and Acquisitions
Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials an organization can undergo. Every organization has their own security policies, and applying…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security