Security
IoT Isn’t Just About the ‘Thing’
Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of loc…
Harnessing the Power of NetFlow and Packet Analysis
Packet capture has long been used by network operators, but a variety of challenges have limited its effectiveness in security and threat detection. In large networks, packet capture can collect terabytes of packet data, and sifting through that data for evidence of an intrusion can take a long time…
Cisco Securely Connects the Rio 2016 Olympic Games
The Olympic Games represent the pinnacle of athleticism and excellence on the world stage like no other event. The scale of the preparation and production that goes into them is absolutely massive. That’s why providing connectivity and security to the 2016 Olympic Games in Rio was both a challenge a…
Urgent Proactive Customer Notification to Prevent ASA Outages
On March 29, Cisco became aware of several customer outages involving different releases and models of Cisco ASA and Cisco Firepower Threat Defense (FTD) appliances. Cisco has published a Field Notice urging Cisco customers who are running specific releases of software to reboot their devices to pre…
How to Increase the Presence – and Impact – of Women in Cybersecurity
This blog is the first in a series of posts featuring perspectives from Cisco women in security. Next month’s blog will feature Chief Privacy Officer, Michelle Dennedy. When I started my information security career at NASA’s Ames Research Center in 1988, there were very few women in the field. In f…
Tabletops Aren’t Just For Eating Dinner On
How to take your Incident Response plan to the next level ‘Practice does everything’ – Periander (Often misquoted as ‘Practice makes perfect’) You’ve gone through the work of creating an incident response (IR) plan, created some runbooks to deal with likely, known threats, and you’re feeling a…
Payment Processor Secures Global Network with Stealthwatch
Elavon is the fourth-largest payment processing company in the world. They process more than 3 billion transactions annually, worth more than $300 billion. Elavon has more than a million customers and is a leading payment solutions provider for airlines and a top five provider for hospitality, healt…
March 2017 Cisco IOS & IOS XE Software Bundled Publication
Today, we released the first Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2017. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition…
“Time to Evolve” Analysis Yields New Insight on Malware Obfuscation Techniques and Adds Dimension to “Time to Dete …
[Blog authored by Aaron Weis and Samuel Wigley] Cisco has been measuring our security products’ median “time to detection” (TTD) — the window of time between a compromise and detection of a threat — since 2015. This exercise is a way for us to benchmark our progress, and continually refine our appro…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
1