Security

December 30, 2016

SECURITY

The impact on network security through encrypted protocols – HTTP/2

This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast…

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…

December 14, 2016

SECURITY

In plain sight: Credential and data stealing adware

Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When advertising was introduced to software, users had a surprisingly…

December 13, 2016

SECURITY

Why the “Seven Steps of Cyber Resilience” Prove Critical for Digital Transformation

Organizations aren’t just talking about digital transformation – they’re doing it: More than 75 percent of global business leaders cite digitization as a top strategic priority and nearly seven in ten say their company will meet its digital transformation objectives this year, according to a recent…

December 9, 2016

SECURITY

Prevent, Detect and Respond with Cisco AMP for Endpoints

Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams need to automatically detect a threat when it gets i…

December 6, 2016

SECURITY

FIPS and Deterministic ECDSA: Achieving robust security and conformance

Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed it. ECDSA and DSA are two widely used, standardized digital signature schemes. In order to sign a message, internally both…

December 5, 2016

SECURITY

Cisco Signs on with Privacy Shield

As I blogged in July of this year, Cisco supports protecting and enabling the international flow of personal data that furthers a progressive economy. To that end, we received official word that we are loud, proud, and on the list for the Privacy Shield – the voluntary, self-certification framework…

December 5, 2016

SECURITY

Customer-focused Incident Response Service

In our highly connected business environments, the need to respond to the inevitable security breach is on the minds of every CISO.  An increasing number of organizations rely on the services of a Managed Detection and Response (MDR) provider.  According to the Cisco 2016 Annual Security Report, 42…

November 29, 2016

SECURITY

To be Effective, Security Needs to Play Well with Others

Effective security is simple, open, and automated.  In the last blog, I described several efforts by Cisco to pursue simplicity.  Now let’s talk about how we are executing on the open part. Openness is about playing well with others. As a kid I heard it from my parents, and now I find myself saying…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security