Security
Black Hat USA 2017: Cisco Umbrella Joins the NOC
Cisco Cloud Based Security in the SOC Black Hat USA marked its 20th anniversary this year. The members of the NOC management showed me photos of the original NOC: a single router in a closet. The NOC has grown with the conference; into a well-managed team of experts from around the globe, from vario…
How Adversaries Are Refining and Improving Ransomware in 2017
Once adversaries have found a method for breaching network defenses, stealing data, or otherwise generating revenue, they’ll continue to refine these tactics to avoid detection and improve effectiveness. Ransomware, one of the more high-profile tools leveraged by adversaries, has undergone this same…
Value Chain Security: Mid-Year 2017 Perspective
Value Chain Security is increasingly top of mind across industry and government. The word is out – the value chain must be addressed to ensure viable security. Whether the discussion is framed as third party risk, cybersecurity or critical infrastructure, Cisco is at the forefront of address…
Cisco AMP for Endpoints Included in Gartner’s “The Evolving Effectiveness of Endpoint Protection Solutions” 2017 A …
Endpoint security comes in many different shapes and sizes: “Endpoint Protection Platforms (EPP)” “Antivirus (AV)” “Endpoint Detection and Response (EDR)” “Next-Generation Endpoint Solutions” The list goes on. Faced with so many different options, it can be tricky to know which type of endpoint se…
Threats with Escalating Impact: Announcing the Cisco 2017 Midyear Cybersecurity Report
It’s time again for our Midyear Cybersecurity Report (MCR), which offers updates on the security research and insights revealed in the recent Annual Cybersecurity Report. The unsettling news at this halfway point in the year is that the bad actors are adding new and sophisticated spins to their expl…
For Women in Cybersecurity, Possibilities are Endless
This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and Michelle Dennedy, Chief Privacy Officer. When the public thinks of cybersecurity we often envision people sitting in dark roo…
Highlights of Effective Security from Cisco Live Las Vegas
I’m still excited after Cisco Live Las Vegas. Cisco Security was everywhere. Our partners were enthused, our customers were engaged, and I couldn’t be more proud of our team and how we continue to deliver simpler, more effective security. I love Cisco Live. This event is unlike any other gathering a…
Are You The Lucky One? Sometimes Luck Can Bring You Malware
For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective technique in the attackers toolbox. Anyone can be a target. While m…
Cisco Firepower NGFW Delivers Unparalleled Threat Defense in NSS Labs Testing
Real-World Testing to Inform Your NGFW Buying Decision We’re excited to share with you the latest NSS Labs NGFW test results. In the most rigorous independent NGFW testing to date, Cisco outperformed eight competitors in security effectiveness, blocking 100% of evasions and surpassing four vendors b…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2