Security
To be Effective, Security Must be Simple, Open, and Automated
Organizations must take advantage of the digital economy in order to succeed and grow. But to do this, and do it securely, we can’t be compromised by complexity. Our IT landscapes are often systems cobbled together over the years. We may have servers from 15 years ago and cloud apps from 15 minutes…
Top 3 Actions to Take Now to Secure Your Digitization Strategy
At Cisco, we talk a lot about cybersecurity as a strategic advantage for organizations. We believe that a strong security program must be an inherent component of a digitization strategy. There are consequences for organizations that don’t have a plan for addressing this risk. As Ashley Arbuckle, Vi…
IoT: Securing the Next Chapter of the Digitization “Book”
The Internet of Things (IoT) era is here: Nearly two-thirds of organizations currently collect data from equipment, devices or other connected endpoints and use it for a business purpose, according to survey findings from 451 Research. The most common sources of IoT data are equipment related to dat…
Piecing Together Malicious Behavior in Encrypted Traffic
This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users’ privacy. However, it also brings tough challenges for intrusion detection systems that need to analyze the traffic wit…
Turning Cybersecurity into a Strategic Advantage
Most C-suite leaders think about cybersecurity as a way to stop threats. But in today’s intensely competitive digital economy they should be thinking about cybersecurity as a strategic advantage that not only protects business value, but enables new business value. The prevailing focus on threats to…
Combatting Cybercrime with an Incident Response Plan
Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus,…
Malicious Microsoft Office Documents Move Beyond InkPicture
In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the standard events used to launch VB macro code when a document is opene…
Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee
During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose secur…
Combating Email Spoofing with Cisco Email Security Forged Email Detection
In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues surrounding spoofed emails on the MTA, but they all have shortcomings…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
5