Security
CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 is Now Available
I am pleased to announce that the OASIS CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 committee specification is now available. As covered in our previous blog posts, the purpose of the OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC) is to standardize the…
Top Three Considerations When Securing Office 365 Email
Moving to the cloud is a no brainer. It’s far more cost effective than maintaining internal systems. No wonder companies have been transitioning to cloud platforms, like Microsoft Office 365, over the last few years. It’s great for the bottom line. Companies with fewer than 1,000 users can expect to…
Cisco Security Connector: Built for iOS 11
Apple and Cisco have partnered to help businesses in every industry accelerate their mobile transformation. From seamless user experience with collaborative applications to Wi-Fi optimization, the partnership has been grounded in a tangible reality. Apple designed iOS to be simple, intuitive, and po…
Get Ready, Get Certified: Early Adoption of CBPR Makes Doing Business with Asia Easier
While the EU General Data Protection Regulation (GDPR) enforcement deadline is less than a year away and it’s “all systems go” to get ready, privacy – like all other fundamental human rights – is not just a European issue. The specific rules and requirements might differ between jurisdictions, but t…
When Walls Come Down: Working Together to Protect IoT Devices
When you begin remodeling an older home you realize that some walls are there for good reasons. Others block our modern, open-floor-plan lifestyles and can come down. Years ago, factories and utilities separated their Information Technology (IT) and Operations Technology (OT) teams. The thinking was…
Culture of Security Nets Industry Recognition
One of the best aspects of my job is when I get to recognize my team for their passion, dedication and excellence – characteristics that I see and appreciate in them every day. It is always exciting and humbling when they are recognized across the industry for their outstanding work. Today, I’m extr…
What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods
What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of the early day…
Here Are 3 Things that Drive Security for the Intuitive Network
Hint: ISE 2.3 Plays Key Role We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in security, you get dynamic protection that enables your business to evolve at the breakneck pace the ma…
Securing the IoT: Processes and People Needed!
IoT promises to boost corporate profits worldwide by 21 percent by 2022, according to Cisco analysts. That’s because IoT can help businesses lower costs by realizing new efficiencies and drive new revenues by enabling new business models. Digital transformation in general, and IoT in particular, can…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2