Security
On or Off the Clock, Staying Cyber Secure is a New Fact of Life
On or Off the Clock, Staying Cyber Secure is a New Fact of Life Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of mind for home networks as well. Take a quick guess at how many mobile devices are automatically connecting with your home Wi-Fi once…
Lessons Learned from Testing Cisco EST Implementations for Interoperability with DigiCert
Thanks to DigiCert for their contributions co-authoring this post. Interoperability for technology solutions is a top priority—standards used in these solutions become irrelevant when products operate in a silo. Thus, shifting to a new protocol in any solution takes careful consideration and collabo…
NSCAM: Tips from Talos for End-Users
As groups around the world continue the conversation around cybersecurity – we’re at the midway point of National Cyber Security Awareness Month (#NCSAM) in the U.S. and European Cyber Security Month (#CyberSecMonth) – and speed toward the holidays, we at Cisco Talos want to touch on how to stay saf…
Cisco and the NIST Cybersecurity Framework: Benefit from a Fresh and Innovative Approach to Cybersecurity
Picture in your mind a typical US federal agency. Go ahead, close your eyes and imagine it. Seriously, do it. As you think about that agency, pick the first two adjectives that came to mind. Did they happen to be fresh and innovative? If not, then maybe you should take a look at today’s National In…
Cybersecurity Awareness Begins – and Ends – with Employees
This month advocates worldwide continue to shine the light on cybersecurity. In the U.S. this week’s National Cyber Security Awareness Month theme is “From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace.” We at Cisco firmly believe that people are a core compon…
Phishing for Threat Intelligence: Using Your Spam Quarantine for the Greater Good
Effectively protecting your assets increasingly involves effective threat intelligence to better understand the types of attackers targeting your sector, and what your vulnerabilities are. Lack of any threat intelligence at all, or even the foresight to use Google and Twitter to spot fake scams tren…
ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography
Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC o…
Simpler NGFW Management – Lets You Get Home in Time for Dinner
“Call me anything you want, but just don’t call me late for dinner.” I wonder how many of us are familiar with this old quote. Security management often burdens teams to put in extra cycles to get the most appropriate access and security policies in place. The process too often isn’t simple and – gu…
Cybersecurity Now and In the Future – Our Shared Responsibility
October is Cyber Security Awareness Month when participating governments and private industry jointly sponsor advocacy campaigns to promote awareness and ensure that every person around the world has the proper information and resources to be safer and more secure online. As a founding member of the…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security