Security
Why We Must Get Data Privacy Right
As consumers the world over gear up for the holiday shopping season, and with Black Friday and Cyber Monday soon upon us here in the US, global consumers will be purchasing online more than ever before. In fact, global e-commerce sales are projected to be more than $140 billion over the holidays, up…
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog, the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure those connected devices are acting…
Finding the malicious needles in your endpoint haystacks
Accelerate Threat Hunts and Investigations with Pre-Curated Complex Queries Security teams often lack the ability to gain deep visibility into the state of all their endpoints in real time. Even with a bevy of tools at their fingertips, once an incident occurs, conducting investigations can be liken…
Welcome to the New Zero Trust
Complexity, opacity and the gatekeeping of knowledge are tactics often used to appear sophisticated or intelligent. They can also be used to intimidate. In security and technology, complexity can lead to critical gaps in visibility and an extended attack surface – with too many vendors and sol…
Consolidate your Security in the Cloud with Cisco Umbrella
What makes a great partnership? Open communication and a passion for constant advancement are two important elements. Our customers have helped us continuously innovate, and together, we’re transforming how security is delivered. Over the past 12+ months, we embarked on a journey to take Cisc…
The death of the network perimeter and the firewall? Not so fast.
Welcome to The Future of Firewalling, Part 1… For over two decades, the firewall has been the de-facto tool that facilitated secure connectivity between different networks. Firewalls were traditionally designed around the idea that internal traffic and users were inherently trustworthy and external…
Securing Your Future by Innovating Today
At a time when cybercrime costs three times more than natural disasters globally1, the demands on security are constantly growing. Whether you’re asked to protect a workforce that roams anywhere, a workplace that is digitized, or workloads that run wherever, your disparate security solutions are cre…
Establishing Device Trust to Secure the Workforce
Challenges of Protecting Endpoints With an estimated 70% of breaches starting on endpoints – laptops, workstations, servers, and mobile devices – organizations need visibility into the devices connecting to applications both on the network and in the cloud. Organizations need the abilit…
Remote Access Trojans
You’re working for a high-profile technology company, close to releasing a market-changing product to the public. It’s a highly contested space, with many competitors, both domestic and international. There’s also a lot of buzz in the media and online speculation on the scope and impact your new pro…
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
7