Security
AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before
No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping it. Cisco AMP for Endpoints provides deep visibility into the activity of files on your system so that you can spot malicious behavior quickly a…
When you need complete privacy: An on-premises private cloud
Do you dream of keeping your data under a lock and key that only you control? Or are you trying to appease regulations, whether corporate or government mandated? Organizations should not fear the auditor more than the attacker. While many have come to adopt the cloud, there are cases where it might…
Incident Response Goes to Hollywood
Having personally spent a lot of time at Fortune 500’s, I know that individuals tend to develop blinders when dedicated to an organization, and begin to accept that things are done a certain way, and there is an order about things. It may come as a surprise then, when others don’t do things the way…
Insiders: The often forgotten threat
Insider threats are of particular concern to organisations as the impact of a rogue insider can be catastrophic to the business. The 2016 Verizon Data Breach Investigations Report showed that 15% of data breaches were a direct result of insider deliberate or malicious behaviour. Given that it is no…
Simplifying end-to-end security with SAFE
End-to-end security tends to be very abstract and difficult for humans to visualize. The challenges of designing, building and maintaining networks with security across every business case and each part of your network is no simple task. It requires that you know why you are building the network fro…
The Second Law of IoT: Connect Consciously
In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is establ…
How Cisco Talos is Fighting the Good Fight
It may surprise you to know that Cisco security researchers have been fighting quietly, for more than a decade, on your behalf to defeat cyber criminals. Cisco Talos, our security intelligence and response organization, is an elite group of security experts focused on protecting you and your organiz…
A Winning NGFW
Cisco Firepower NGFW recognized with Best of Interop 2016 Award for Security Each year at Interop, a group of the most influential IT practitioners, analysts and professionals vote on the technologies that are having “the most significant technical impact on their segment and are helping to move bus…
The Formula One Approach to Security
Many of today’s systems are built on telemetry, the automated gathering of remote data measurements to gain insights and manage performance and operations. One industry that has been quick to embrace telemetry is auto racing. Winning racing teams are outfitting their cars with around 100 sensors tha…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
6