Security

March 16, 2017

SECURITY

How to get started on programming Firepower using FMC APIs?

If you are reading this blog then you most likely understand that APIs allow inter-working among products. In the context of Firepower Management Center, the REST APIs allow programming of the Firepower devices to allow one to automatically provision devices, deploy policies and controls, and monito…

March 9, 2017

SECURITY

Three Essential Elements of a Reliable Cyber Resilience Strategy

Next week’s NCSA Nasdaq Cybersecurity Summit in New York will focus government and private sector leaders on two priorities—developing a strategic approach to combating pervasive cyber threats and creating a culture of cybersecurity across enterprises. These are critical issues that Cisco is address…

March 7, 2017

SECURITY

The Wikileaks Vault 7 Leak – What We Know So Far

UPDATE: March 17, 2017 Based on the “Vault 7” public disclosure, Cisco launched an investigation into the products that could potentially be impacted by these and similar exploits and vulnerabilities. As part of the internal investigation of our own products and the publicly available information, C…

March 3, 2017

SECURITY

The IoT(s): One Size Does Not Fit All

Today let’s talk about IoT as a plurality. I suspect that you may have recently heard the phrase that “words matter,” and when talking about something as broad and diverse as “IoT” it really does indeed matter. It matters because correctly defining what you are speaking about, and to whom, will help…

March 2, 2017

SECURITY

Short on Security Resources? Try These Force Multipliers

One in four organizations are exposed for six months or longer due to a lack of qualified security workers. And in Europe almost one-third of cyber security job openings remain unfilled. That’s the challenging picture reported by ISACA at this year’s RSA Conference. You’re thinking, “tell me s…

February 27, 2017

SECURITY

Cisco PSIRT – Mitigating and Detecting Potential Abuse of Cisco Smart Install Feature

Cisco PSIRT has become aware of attackers potentially abusing the Smart Install (SMI) feature in Cisco IOS and IOS XE Software. While this is not considered a vulnerability, PSIRT published a Cisco Security Response on February 14, 2017 to inform customers about possible abuse of the Smart Install f…

February 23, 2017

SECURITY

Recognized Excellence in Trustworthy Product Development and Pervasive Data Protection

I am proud to announce that last week at RSA the 2017 Info Security Products Guide Global Excellence Awards honored three teams from the Cisco Security and Trust Organization. These teams were recognized for their work in defending the company’s networks, building secure and trustworthy products and…

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numero…

February 22, 2017

SECURITY

Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach

We live in a time when lines in IT are blurring, and the line between security and network operations is just one example. When organizations are breached, their network is imperiled and business can suffer. Resiliency, performance, and threat defense are increasingly intertwined. No one understands…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security