Security

November 28, 2016

SECURITY

What’s in Your Incident Response Go-Bag?

October was National Cyber Security Awareness month and there’s been a lot of talk about how organizations should be doing more to protect their networks. One of the current trends in cyber security is that organizations are increasingly turning to trusted partners like Cisco for some or all of thei…

November 21, 2016

SECURITY

What do Mirai & IoT botnets mean to the public sector?

5 First Steps to Defending against IoT Driven DDoS Attacks In honor of October’s National Cybersecurity Awareness Month, users of Twitter, Netflix, Reddit and the New York Times were treated to a special treat – and just in time for Halloween. Unfortunately it was more of a trick as users of these a…

November 16, 2016

SECURITY

The Case for Next-Gen Intrusion Prevention to Protect Digital Business

Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business for it. Not only does selling occur on-line, businesses run their operations online and virtually with cloud-based pro…

November 14, 2016

SECURITY

Cisco Security: To the Tune of the Dark Side of the Moon

As the days grow shorter and colder, I’m reminded that November is Critical Infrastructure Security and Resilience Month here in the US. According to the Department of Homeland Security, this observance “builds awareness and appreciation of the importance of critical infrastructure and reaffirms the…

November 10, 2016

SECURITY

Hello Customer, We’ve Got Your Back!

According to Chuck Robbins, “At Cisco you, our customers, are our number one priority. We can only be successful if we’ve helped you be successful.” The customer experience has always been a top priority for Cisco. But over the last several quarters, Cisco Security has been hyper-focused on ensuring…

November 7, 2016

SECURITY

Is Your Race to SOC Headed for an Epic Crash?

Before You Take Off, Get Up To Speed on These Six Precursors to Incident Response It seems most advice on setting up a Security Operations Center (SOC), or creating a Computer Security Incident Response Team (CSIRT), focuses on people, technology or processes. Unfortunately, such advice may also in…

November 1, 2016

SECURITY

Transforming Endpoint Security

It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective…

October 31, 2016

SECURITY

The Evolution of Scoring Security Vulnerabilities: The Sequel

Back in April, I wrote a blog post about the new version of the Common Vulnerability Scoring System (CVSS). The changes made for CVSSv3 addressed some of the challenges that existed in CVSSv2. For example, CVSSv3 analyzes the scope of a vulnerability and identifies the privileges an attacker needs t…

October 31, 2016

SECURITY

National Cybersecurity: A Collaborative Approach is Required

As we wrap up National Cybersecurity Awareness Month in the U.S., cybersecurity continues to be a top-of-mind issue for business, government and consumers alike. In February 2016, President Obama announced a Cybersecurity National Action Plan to improve the United States’ cybersecurity posture. The…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security