Security

December 27, 2017

SECURITY

The Impact on Network Security Through Encrypted Protocols – QUIC

I have already written about two secure protocols that are impacting our network security. The first was HTTP/2, the second one was TLS 1.3. Both posts can be found here: HTTP/2 TLS1.3 Today I want to talk about another very important protocol, it is called QUIC. QUIC stands for QUICK UDP INTERNET C…

December 21, 2017

SECURITY

Defending Against The $5B Cybersecurity Threat – Business Email Compromise

If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume th…

December 18, 2017

SECURITY

Collaborating with NCSU to promote lightweight crypto validation and assessment

Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been working with the industry, the National Institute of Standards and Technology (NIST) and other internati…

December 18, 2017

SECURITY

No One Can Detect Threats in Your Public Cloud Like Cisco

Whether it is misconfigured cloud assets, phishing, or malware, protecting your public cloud workloads from threats is a challenge with expensive consequences. If you have tried to extend your on-premises threat detection solutions in the public cloud, you probably know that they can be hard to mana…

December 15, 2017

SECURITY

Cryptojacking: Hijacking your computer resources

Your internet connection is slower than usual, your PC is also very slow, and you notice that your CPU fan is running faster when you are on a given website. All the above symptoms indicate that you could be a victim of cryptojacking. This is a new kind of menace in which malicious users or the host…

December 14, 2017

SECURITY

Now Available: Cisco Security Connector for iOS

We’re excited to announce the availability of the Cisco Security Connector app for iOS, a first of its kind enterprise security solution for iPhone and iPad. Working with Apple, our team of engineers used new platform capabilities and APIs embedded into iOS 11 to deliver the deepest visibility and c…

December 13, 2017

SECURITY

Shaping a Diverse and Stronger Cybersecurity Industry

Aside from scuba diving and working with Cisco customers to improve cyber resiliency, cooking is one of my greatest passions.  My favorite dishes are a fusion of the best ingredients, each complementing the other and accentuating the right flavors to achieve culinary heaven.  You see, if you stick w…

December 12, 2017

SECURITY

Hackers are using encryption to bypass your security controls

As of today more than half of the web traffic is encrypted. That’s a big win for businesses and all of us, since it guards against eavesdropping and tampering with content as it moves from device to server and back again. Of course this rise in encryption comes with one big, obvious downside. Hacker…

December 12, 2017

SECURITY

DevSecOps: Win-Win for All

[This is part one of a four-part blog series about DevSecOps.] Today, companies are transforming their business to offer customers connected digital experiences where products and services are increasingly powered by mobile, cloud and data analytics capabilities.  Developers in turn are moving to De…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security