Security

February 20, 2017

SECURITY

A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats

At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the vari…

February 17, 2017

SECURITY

RSA Conference 2017 Security Operations Center Wrap-Up

Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations Center, exemplified the power of a four year partnership that provide…

February 14, 2017

SECURITY

The impact on network security through encrypted protocols – TLS 1.3

This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specific…

February 13, 2017

SECURITY

Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses

Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of the crime emerges, which in the case of a serial killer often includes his or her MO or method of operati…

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry…

February 9, 2017

SECURITY

The Transformation of the Cybersecurity Workforce

When the commercial internet was young, IT structure was relatively simple. Today, though, growing complexity is one of IT’s biggest security challenges. The more complex the system, the greater the attack surface. It is much easier now to hide multi-pronged attacks in different layers and parts of…

February 9, 2017

SECURITY

EPP? EDR? Cisco AMP for Endpoints is Next Generation Endpoint Security

You may be wondering why Cisco AMP for Endpoints was not included in Gartner’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Traditionally, Gartner placed Cisco AMP for Endpoints within their Endpoint Detection and Response (EDR) category of endpoint security tools. But as buyer needs…

February 9, 2017

SECURITY

Introducing Cisco Umbrella, the industry’s first Secure Internet Gateway in the cloud

If your job is anything like mine, you find yourself using a wide range of SaaS-based applications. Today alone, I found myself using Salesforce.com, WebEx, Workday, Spark, Office 365, Box, JIRA, Trello, SmartSheets, and Google Docs. And I’m not even counting some of the things I use for fun: Spotif…

February 7, 2017

SECURITY

Data Privacy Day – A Quick Recap but a Full-time Commitment

On January 28, the international community observed Data Privacy Day, an annual effort to create awareness about the importance of privacy and protecting personal information. Cisco was honored to once again participate in the National Cyber Security Alliance’s (NCSA) Data Privacy Day events. Each y…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security