Security
Securing Your Data in the Transformation to Digital
I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Ha…
A Steady Drumbeat for Simple, Open and Automated
I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resour…
Detecting Encrypted Malware Traffic (Without Decryption)
Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware sa…
What is the Body Language of Your Encrypted Network Traffic Really Saying?
Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are makin…
Control Your Own Security
Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital’ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeb…
Introducing Threat Grid for Meraki MX
Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step furt…
Improving Cybersecurity in Healthcare: Visibility
Imagine going to the doctor for a routine checkup. After greeting you, the physician pulls up your medical records on his tablet, but instead of your medical history, this screen pops up: Now imagine if you were waiting on the results of a biopsy, or if the ultrasound machine displayed this screen…
CVRF Version 1.2 Now Available for Public Comment
A few months ago, I wrote about the new OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC). The purpose of the CSAF Technical Committee is to standardize the practices for structured machine-readable security vulnerability-related advisories. And then we will further refine tho…
Malicious Spam Comes Roaring Back and Cisco Email Security is Ready
“Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh wait, now my scree…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security