Security
Three Things Businesses Can Do to Protect Data Privacy
In today’s global digital economy, protecting data privacy is a must. With customers all over the world, every company must be able to demonstrate how they are protecting data privacy to earn the trust of their customers, users, partners and employees. It starts with these three things. 1. Be transp…
Who Is Managing Our Data Assets?
Most organizations have people or teams to optimally manage their valuable corporate assets. Real estate teams manage and optimize the use of space. IT manages the technology. Same with inventory, cash and investments, and people resources. Even intangibles like patents and other intellectual prop…
Broadening the Art of the Possible Through Diversity
During a recent conversation with an industry peer and great friend, he asked, “How did you make Cisco’s Security and Trust Organization so inclusive and diverse?” The question made me pause for a couple reasons. First, that he thought that one person alone could be behind such a broad team achievem…
Security Challenges and Opportunities: The Security Day at Cisco Live in Barcelona on 29th January
[January 19, 2018 Update: Registrations for Security Day are now closed. Please visit our Security Track page here to learn about our security sessions and other events at Cisco Live Barcelona.] Every organisation has something valuable to protect and adversaries who want to get their hands on it. T…
Security or Innovation?
I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In ord…
Incident Response: Are you ready?
I am a big proponent of “what if” planning. Are you? I spin through what-if scenarios every day. Sometimes I ponder unlikely events, like: what would I do if I came across a bear while hiking in the forest? Or, a more positive but equally unlikely example: what if I won a million dollars? Either way…
Five Things You Can Do to Manage Your Privacy Now
The Internet of Things – the increasingly connected world in which we live – is rapidly expanding. We love our convenient and fun devices – like personal assistants, wearables, speakers, cameras, TVs, cars, home alarm systems, toys and appliances. But it’s important to understand that connected…
Harnessing the Power of Network Meta Data: Finding Malware
Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data. These threats are seemingly everywhere. In order to protect against these threats, we use strong passwords and encryption. Unfortunately, our adversaries are getting the same…
Introducing Exploit Prevention to Stop File-Less Attacks
In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. They try to gain access to your endpoints and your sensitive data by exploiting weaknesses in your system, like a vulnerability in your software or in your operating system processes.…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
1