Security
The impact on network security through encrypted protocols – HTTP/2
This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast…
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…
In plain sight: Credential and data stealing adware
Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When advertising was introduced to software, users had a surprisingly…
Why the “Seven Steps of Cyber Resilience” Prove Critical for Digital Transformation
Organizations aren’t just talking about digital transformation – they’re doing it: More than 75 percent of global business leaders cite digitization as a top strategic priority and nearly seven in ten say their company will meet its digital transformation objectives this year, according to a recent…
Prevent, Detect and Respond with Cisco AMP for Endpoints
Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams need to automatically detect a threat when it gets i…
FIPS and Deterministic ECDSA: Achieving robust security and conformance
Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed it. ECDSA and DSA are two widely used, standardized digital signature schemes. In order to sign a message, internally both…
Cisco Signs on with Privacy Shield
As I blogged in July of this year, Cisco supports protecting and enabling the international flow of personal data that furthers a progressive economy. To that end, we received official word that we are loud, proud, and on the list for the Privacy Shield – the voluntary, self-certification framework…
Customer-focused Incident Response Service
In our highly connected business environments, the need to respond to the inevitable security breach is on the minds of every CISO. An increasing number of organizations rely on the services of a Managed Detection and Response (MDR) provider. According to the Cisco 2016 Annual Security Report, 42…
To be Effective, Security Needs to Play Well with Others
Effective security is simple, open, and automated. In the last blog, I described several efforts by Cisco to pursue simplicity. Now let’s talk about how we are executing on the open part. Openness is about playing well with others. As a kid I heard it from my parents, and now I find myself saying…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
8