Security

December 8, 2017

SECURITY

Black Hat Europe 2017: Malware Analysis in the SOC

New Cisco Threat Grid dashboard yields faster malware analysis and response Black Hat Europe kicked off just after the X Factor series finale was recorded live at the London ExCel Center, briefly mixing the Network Operations Centre (NOC) and Security Operations Centre (SOC) staff with hordes of tee…

December 6, 2017

SECURITY

Cisco Cloudlock Joins the Box Trust Ecosystem

We live in an age where technology is core to business and can impact success.  Staying competitive requires adopting and adapting to new technology. Direct correlation can be drawn to the pace of innovation and collaboration among teams.  Companies spend billions of dollars every year to implement…

December 5, 2017

SECURITY

You already own the most powerful security tool. Are you really using it? Really?

See and stop threats using your existing network. If you live in the United States, there’s a 44% chance your most valuable personal data were recently compromised[1]. The silver lining, if there is one, is that this breach compelled many to start actively monitoring their credit report for signs of…

December 4, 2017

SECURITY

Introducing a New Addition to Cisco’s Security Impact Rating

The Cisco Product Security Incident Response Team (PSIRT) is committed to protecting customers by sharing security-related information in a timely manner and in different formats. Although some of the information that we receive may not relate to a specific vulnerability or issue in a Cisco product,…

November 30, 2017

SECURITY

CMS Brute Force Attacks Are Still a Threat

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a brute force attack c…

November 29, 2017

SECURITY

Improving Cybersecurity in Healthcare Part II: Control

The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in hea…

November 29, 2017

SECURITY

Dissecting a Breach: The Process of Incident Response

On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.”  This webinar will describe how our team performs incident handling within the service and what you should expect during an…

November 28, 2017

SECURITY

Cisco Stealthwatch Cloud Announces Support for AWS PrivateLink

Cisco Stealthwatch Cloud recently launched as a fully procurable SaaS service available on AWS Marketplace. As a security service available on Amazon Web Services (AWS), Stealthwatch Cloud provides security monitoring, visualization, and automatic threat detection. Stealthwatch Cloud uses advanced m…

November 28, 2017

SECURITY

4 Key Questions To Determine If Your Endpoint Security Is Up To Snuff

Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool desi…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security