Security
Cisco Takes Exclusivity Out of Cybersecurity
Nearly 30 years ago, I attended the first of what would be hundreds of information security conferences throughout my career. I was astonished to be one of only a handful of females in a sea of men – our career goals were the same, but I had a steep climb compared to my male counterparts. I entered…
Ransomware – What it is, how to avoid it and what to do if it gets you
Ransomware has been all over the news since 2015. You’d think we would all know how to deal with it and the fad would be dying by now. Well, that’s what I would think. It turns out that ransomware generates a lot of cash for criminals, an estimated $1 billion in 2016. It also has a low cost struc…
Architecting a More Secure Future
The new age of innovation is providing a level of convenience and technological advancements that were once unfathomable. But with every breakthrough comes challenges, and more precisely these days, security challenges. We, in the security industry, are constantly faced with new threats emerging fro…
Business Critical Security
Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts: when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train yo…
Joining Forces for Cybersecurity Openness – Cisco pxGrid and McAfee OpenDXL
Interoperation of two leading security integration frameworks delivers unprecedented breadth in multi-vendor collaboration. Simplifies security vendor integration for customers. There is strength in numbers. Here the strength is in the number 2, because it equals almost 100. Funny math you say? …
Attacking the Weakest Link in the Supply Chain
What Just Happened?! Millions invested in the latest security technologies? Check. Your team trained on information security best practices? Check. Passed a third-party review of your security architecture? Check. So, how the hell were hundreds of your servers’ hard drives just destroyed by malware…
Three Ways in which Stealthwatch Helps You Get More from Your Network Data
Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he…
Tackling the Threat Landscape with Innovative Partnerships
As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is…
Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)
On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These are protocol-level vulnerabilities that affect wireless ven…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2