Security

October 23, 2017

SECURITY

Cisco Takes Exclusivity Out of Cybersecurity

Nearly 30 years ago, I attended the first of what would be hundreds of information security conferences throughout my career. I was astonished to be one of only a handful of females in a sea of men – our career goals were the same, but I had a steep climb compared to my male counterparts. I entered…

October 20, 2017

SECURITY

Ransomware – What it is, how to avoid it and what to do if it gets you

Ransomware has been all over the news since 2015. You’d think we would all know how to deal with it and the fad would be dying by now.  Well, that’s what I would think.  It turns out that ransomware generates a lot of cash for criminals, an estimated $1 billion in 2016.  It also has a low cost struc…

October 20, 2017

SECURITY

Architecting a More Secure Future

The new age of innovation is providing a level of convenience and technological advancements that were once unfathomable. But with every breakthrough comes challenges, and more precisely these days, security challenges. We, in the security industry, are constantly faced with new threats emerging fro…

October 19, 2017

SECURITY

Business Critical Security

Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts:  when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train yo…

October 18, 2017

SECURITY

Joining Forces for Cybersecurity Openness – Cisco pxGrid and McAfee OpenDXL

Interoperation of two leading security integration frameworks delivers unprecedented breadth in multi-vendor collaboration.  Simplifies security vendor integration for customers. There is strength in numbers.  Here the strength is in the number 2, because it equals almost 100.  Funny math you say? …

October 18, 2017

SECURITY

Attacking the Weakest Link in the Supply Chain

What Just Happened?! Millions invested in the latest security technologies? Check. Your team trained on information security best practices? Check. Passed a third-party review of your security architecture? Check. So, how the hell were hundreds of your servers’ hard drives just destroyed by malware…

October 17, 2017

SECURITY

Three Ways in which Stealthwatch Helps You Get More from Your Network Data

Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he…

October 17, 2017

SECURITY

Tackling the Threat Landscape with Innovative Partnerships

As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is…

October 16, 2017

SECURITY

Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)

On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These are protocol-level vulnerabilities that affect wireless ven…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security