Security

October 18, 2016

SECURITY

On or Off the Clock, Staying Cyber Secure is a New Fact of Life

On or Off the Clock, Staying Cyber Secure is a New Fact of Life  Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of mind for home networks as well. Take a quick guess at how many mobile devices are automatically connecting with your home Wi-Fi once…

October 17, 2016

SECURITY

Lessons Learned from Testing Cisco EST Implementations for Interoperability with DigiCert

Thanks to DigiCert for their contributions co-authoring this post. Interoperability for technology solutions is a top priority—standards used in these solutions become irrelevant when products operate in a silo. Thus, shifting to a new protocol in any solution takes careful consideration and collabo…

October 17, 2016

SECURITY

NSCAM: Tips from Talos for End-Users

As groups around the world continue the conversation around cybersecurity – we’re at the midway point of National Cyber Security Awareness Month (#NCSAM) in the U.S. and European Cyber Security Month (#CyberSecMonth) – and speed toward the holidays, we at Cisco Talos want to touch on how to stay saf…

October 12, 2016

SECURITY

Cisco and the NIST Cybersecurity Framework: Benefit from a Fresh and Innovative Approach to Cybersecurity

Picture in your mind a typical US federal agency. Go ahead, close your eyes and imagine it. Seriously, do it. As you think about that agency, pick the first two adjectives that came to mind. Did they happen to be fresh and innovative?  If not, then maybe you should take a look at today’s National In…

October 10, 2016

SECURITY

Cybersecurity Awareness Begins – and Ends – with Employees

This month advocates worldwide continue to shine the light on cybersecurity. In the U.S. this week’s National Cyber Security Awareness Month theme is “From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace.” We at Cisco firmly believe that people are a core compon…

October 6, 2016

SECURITY

Phishing for Threat Intelligence: Using Your Spam Quarantine for the Greater Good

Effectively protecting your assets increasingly involves effective threat intelligence to better understand the types of attackers targeting your sector, and what your vulnerabilities are. Lack of any threat intelligence at all, or even the foresight to use Google and Twitter to spot fake scams tren…

October 4, 2016

SECURITY

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC o…

October 3, 2016

SECURITY

Simpler NGFW Management – Lets You Get Home in Time for Dinner

“Call me anything you want, but just don’t call me late for dinner.” I wonder how many of us are familiar with this old quote. Security management often burdens teams to put in extra cycles to get the most appropriate access and security policies in place. The process too often isn’t simple and – gu…

October 3, 2016

SECURITY

Cybersecurity Now and In the Future – Our Shared Responsibility

October is Cyber Security Awareness Month when participating governments and private industry jointly sponsor advocacy campaigns to promote awareness and ensure that every person around the world has the proper information and resources to be safer and more secure online. As a founding member of the…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security