Security

April 19, 2017

SECURITY

Securing Medical Devices – The Need for a Different Approach – Part 2

When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives…

April 18, 2017

SECURITY

Demanding a Plan for Cyber Resilience in the IoT

Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing’ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the l…

April 18, 2017

SECURITY

Securing Medical Devices – The Need for a Different Approach – Part 1

When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives…

April 14, 2017

SECURITY

IDC Names Cisco AMP for Endpoints a Leader in 2017 Endpoint Security Marketscape

Global analyst firm IDC recently named Cisco AMP for Endpoints a leader amongst endpoint security solutions in their report, “IDC Marketscape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment” (April 2017, IDC #US42385717). The IDC study examines market-leading en…

April 11, 2017

SECURITY

Lateral Movement “Whack-a-Mole”

Win with Network Monitoring The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs. Our incident responders recently worked with a client who…

April 7, 2017

SECURITY

The CISO Evolution – From IT Operations to Earning a Seat at the Table

With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats.  Continuous changes in our connected business landscape make customer data, intellectual pr…

April 7, 2017

SECURITY

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

A core responsibility in my role at Cisco Security is guiding ecosystem partners through the Solution Partner Program, executing daily on the Open and Automated pillars of the Cisco Effective Cybersecurity strategy. Over the past few months, I have been working with TrapX Security, a global leader i…

April 6, 2017

SECURITY

Yesterday’s Cyber Posture Just Won’t Work

Cyber threats have changed radically with the evolution of technology. Yet as threats continue to mount, many enterprises are still relying on yesterday’s cyber protection methods, technology infrastructure, and cultural ethos as the foundations for their modernization efforts. While IT digitization…

April 4, 2017

SECURITY

Black Hat Asia 2017: SOC in the NOC

Detecting PowerShell Exploits Black Hat returned to Asia again in 2017, with two days of technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at the Briefings. The backbone of the conference was the WiFi network, built on site by staff from Ruckus.…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security