Security

August 4, 2016

SECURITY

Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1

Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through the effective monitoring of the policy once the policy is implemented. Through the collection and analysis o…

August 3, 2016

SECURITY

MITM Training at Black Hat USA 2016

To prevent a security breach and loss of critical business data, security teams must be diligent in defining, identifying, and classifying security gaps in their organization’s network. Many security teams conduct pentesting as a way to assess and mitigate any potential gaps.  As a consulting engine…

August 3, 2016

SECURITY

A “quick” guide to QUIC

Intelligence Gathering 101 Traffic analysis is rapidly becoming critical for threat analysis and incident response teams, and a choke point on their capability to be effective. Performing analysis on incoming threats requires security professionals to have monitoring tools that can give them an unde…

August 1, 2016

SECURITY

Cisco Completes Acquisition of CloudLock

I’m excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock’s unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insights and controls that are easy to deploy and simple to manage. In a ne…

August 1, 2016

SECURITY

Attackers Evolve Tactics to Infiltrate Your Network via Email

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…

July 29, 2016

SECURITY

Introducing executive dashboards in CTA

No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats are affecting our network today?” and “how healthy is our network?” We have recently revamped the C…

July 27, 2016

SECURITY

The Official Talos Guide to Black Hat 2016

There is always something of an air of anticipation in the Security community as we approach Black Hat and DEFCON. This is your official guide to what Cisco’s Talos Threat Intelligence team is doing at Black Hat 2016. There are a lot of classes, great talks, technical deep-dives, late parties,…

July 26, 2016

SECURITY

Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report

It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolv…

July 25, 2016

SECURITY

Protect the Branch with Stealthwatch Learning Network License

The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data se…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security