Security

January 22, 2018

SECURITY

Three Things Businesses Can Do to Protect Data Privacy

In today’s global digital economy, protecting data privacy is a must. With customers all over the world, every company must be able to demonstrate how they are protecting data privacy to earn the trust of their customers, users, partners and employees. It starts with these three things. 1. Be transp…

January 18, 2018

SECURITY

Who Is Managing Our Data Assets?

Most organizations have people or teams to optimally manage their valuable corporate assets. Real estate teams manage and optimize the use of space.  IT manages the technology.  Same with inventory, cash and investments, and people resources. Even intangibles like patents and other intellectual prop…

January 16, 2018

SECURITY

Broadening the Art of the Possible Through Diversity

During a recent conversation with an industry peer and great friend, he asked, “How did you make Cisco’s Security and Trust Organization so inclusive and diverse?” The question made me pause for a couple reasons. First, that he thought that one person alone could be behind such a broad team achievem…

January 12, 2018

SECURITY

Security Challenges and Opportunities: The Security Day at Cisco Live in Barcelona on 29th January

[January 19, 2018 Update: Registrations for Security Day are now closed. Please visit our Security Track page here to learn about our security sessions and other events at Cisco Live Barcelona.] Every organisation has something valuable to protect and adversaries who want to get their hands on it. T…

January 9, 2018

SECURITY

Security or Innovation?

I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In ord…

January 8, 2018

SECURITY

Incident Response: Are you ready?

I am a big proponent of “what if” planning. Are you? I spin through what-if scenarios every day. Sometimes I ponder unlikely events, like: what would I do if I came across a bear while hiking in the forest? Or, a more positive but equally unlikely example: what if I won a million dollars? Either way…

January 5, 2018

SECURITY

Five Things You Can Do to Manage Your Privacy Now

The Internet of Things – the increasingly connected world in which we live – is rapidly expanding. We love our convenient and fun ​devices – ​like​ ​personal assistants, wearables, speakers, cameras, TVs, cars, home alarm systems, toys and appliances. But it’s important to understand that connected…

January 3, 2018

SECURITY

Harnessing the Power of Network Meta Data: Finding Malware

Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data.  These threats are seemingly everywhere.  In order to protect against these threats, we use strong passwords and encryption.  Unfortunately, our adversaries are getting the same…

January 3, 2018

SECURITY

Introducing Exploit Prevention to Stop File-Less Attacks

In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. They try to gain access to your endpoints and your sensitive data by exploiting weaknesses in your system, like a vulnerability in your software or in your operating system processes.…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security