Security

September 21, 2017

SECURITY

CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 is Now Available

I am pleased to announce that the OASIS CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 committee specification is now available. As covered in our previous blog posts, the purpose of the OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC) is to standardize the…

September 21, 2017

SECURITY

Top Three Considerations When Securing Office 365 Email 

Moving to the cloud is a no brainer. It’s far more cost effective than maintaining internal systems. No wonder companies have been transitioning to cloud platforms, like Microsoft Office 365, over the last few years. It’s great for the bottom line. Companies with fewer than 1,000 users can expect to…

September 19, 2017

SECURITY

Cisco Security Connector: Built for iOS 11

Apple and Cisco have partnered to help businesses in every industry accelerate their mobile transformation. From seamless user experience with collaborative applications to Wi-Fi optimization, the partnership has been grounded in a tangible reality. Apple designed iOS to be simple, intuitive, and po…

September 14, 2017

SECURITY

Get Ready, Get Certified: Early Adoption of CBPR Makes Doing Business with Asia Easier

While the EU General Data Protection Regulation (GDPR) enforcement deadline is less than a year away and it’s “all systems go” to get ready, privacy – like all other fundamental human rights – is not just a European issue. The specific rules and requirements might differ between jurisdictions, but t…

September 13, 2017

SECURITY

When Walls Come Down: Working Together to Protect IoT Devices

When you begin remodeling an older home you realize that some walls are there for good reasons. Others block our modern, open-floor-plan lifestyles and can come down. Years ago, factories and utilities separated their Information Technology (IT) and Operations Technology (OT) teams. The thinking was…

September 6, 2017

SECURITY

Culture of Security Nets Industry Recognition

One of the best aspects of my job is when I get to recognize my team for their passion, dedication and excellence – characteristics that I see and appreciate in them every day. It is always exciting and humbling when they are recognized across the industry for their outstanding work. Today, I’m extr…

August 28, 2017

SECURITY

What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods

What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of the early day…

August 25, 2017

SECURITY

Here Are 3 Things that Drive Security for the Intuitive Network

Hint: ISE 2.3 Plays Key Role We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in security, you get dynamic protection that enables your business to evolve at the breakneck pace the ma…

August 24, 2017

SECURITY

Securing the IoT: Processes and People Needed!

IoT promises to boost corporate profits worldwide by 21 percent by 2022, according to Cisco analysts. That’s because IoT can help businesses lower costs by realizing new efficiencies and drive new revenues by enabling new business models. Digital transformation in general, and IoT in particular, can…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security