Security

July 25, 2016

SECURITY

Cognitive Bias in Incident Response

This blog is a co-authored by Jeff Bollinger & Gavin Reid Are You Too Confident in Your Incident Response? When Charles Darwin stated “Ignorance more frequently begets confidence than does knowledge,” civilization’s evolution from Industrial Age to Information Age was nearly a century away…

July 22, 2016

SECURITY

Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program

When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm syst…

July 20, 2016

SECURITY

How Cybersecurity is Enabling – not Defeating – Business Innovation

The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and soci…

July 20, 2016

SECURITY

Research Innovations in Simple Usable Security

Every year the Symposium on Usable Privacy and Security brings together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy, to present and discuss the latest research in the areas of usable security and privacy. Cisco’s sponsorship…

July 14, 2016

SECURITY

Cisco Introduces Security Services for Digital Transformation

Around the world, organizations across all industry segments and markets are faced with the task of adopting digital technologies. Business leaders realize they must begin their digital transformation journey now, or risk fundamental business disruption and, potentially, business obsolescence. Unfor…

July 13, 2016

SECURITY

Cisco Defense Orchestrator: The Security Policy Management “Easy Button”

Staying on top of security is hard, especially for network operations staff. If you’re like most of your peers, you probably have lots of devices, tons of policies and many locations and even cloud deployments to account for. Every time you need to change a policy, the complexity and time involved t…

July 13, 2016

SECURITY

75% of the time it works every time

We know that 75% isn’t good enough. Introducing Cisco Umbrella Roaming for Off-Network Protection. It’s that time again—you need to buy a new car. You decide to head down to the used car shop to find the deal of the century. The sales guy proudly hands you the keys to a beautiful 1991 Porsche and sa…

July 12, 2016

SECURITY

Cisco Meraki MX Just Got Better at Fighting Advanced Threats

Cisco redefines what a UTM can be with AMP and Threat Grid for Meraki MX Cybercriminals don’t discriminate – every organization is a target. With the threat landscape continuing to evolve and ever expanding connectivity, digitization and the Internet of Everything (IoE) it has never been more…

July 12, 2016

SECURITY

Cisco Stealthwatch Learning Network License for your digital-ready network

Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security