Security

October 13, 2017

SECURITY

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in risky user behaviors that threat actors are taking advantage of in order to breach information. Attackers are targeting the huma…

October 12, 2017

SECURITY

Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs

As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they update their systems and start implementing cloud solutions? And further, possibly most important – will cyberse…

October 11, 2017

SECURITY

Security in Your DNA: Tips for Securing Your Network

Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation on your network to full advantage? How do you validate that the existing policy aligns with the…

October 11, 2017

SECURITY

How is a Stateful Firewall like a Vintage Porsche?

“Dad, I love your vintage Porsche! But is it safe?” This is the conversation my 90-year old neighbor recently had with his adult children. The Porsche he inherited from his late father-in-law is a thing of beauty –  sleek, classic body, and driven once or twice a week. The low-mile…

October 10, 2017

SECURITY

Phish? Everyone’s on the hook.

There’s no doubt that general awareness for cybersecurity has been on the rise in recent years. The importance of using strong passwords, for example, is now common knowledge. But one very popular and effective threat continues to fly largely under the public’s radar: phishing. Why phishing? Researc…

October 10, 2017

SECURITY

Sting Explains the Importance of IoT Threat Defense

Most of you know Sting, the Grammy-winning solo artist and singer/bassist for English rock band The Police. So many great hits over the years. But how many of you know his late-80’s song “Englishman in New York?” I’m an alien The song opens with Sting, the Englishman, feeling somewhat out of p…

October 9, 2017

SECURITY

GDPR Compliance: Weather You Like it or Not

Imagine this: A weather app that tracks you without your knowledge or consent! An Innocuous Weather App? Weather apps are great. Who doesn’t have one? Like everyone else, you downloaded a free weather app to your smartphone years ago. At that time it asked you to share your current location, as it p…

October 9, 2017

SECURITY

Working Wherever: Digital Safety Beyond the Company Walls

Imagine you’re a business traveler at the airport with a little time to spare before your flight. You fire up your laptop, access the airport’s free wi-fi, log on to your bank account, and pay your credit card bill to free up credit for your trip. Efficient use of time, right? Well, also imagine tha…

October 4, 2017

SECURITY

Securing the Campus

From student data and intellectual property, to reputation and grant funding…higher education institutions are at risk if cybersecurity is not a foundational element in their operations. This fall, more than 20 million students returned to their college or university. Each student will walk on campu…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security