Security

May 2, 2016

SECURITY

The Changing Face of the Healthcare Security Leader

If you worked with just about any hospital or healthcare provider a mere ten years ago you may have come across the Information Security Manager, Director of Security and Compliance, or someone who filled this role under another title. Their role was to lead ‘IT Security’ and manage a small staff of…

May 2, 2016

SECURITY

5 Steps to an Effective Data Incident Response Program

All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Le…

April 28, 2016

SECURITY

The Evolution of Scoring Security Vulnerabilities

The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assess and score security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed some of the challenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vu…

April 26, 2016

SECURITY

The Service Provider Security Question

I talk to a lot of customers and partners in the Service Provider space, and among the many conversations, I notice a common set of concerns centered around a simple question: have we done all that we can to secure both our own infrastructure and that of our customers? Simple enough question, but th…

April 18, 2016

SECURITY

Cybersecurity in the Media and Entertainment Industry… Who Has Your Back?

Today’s broadcast media production companies are facing an environment of enhanced formats, evolving platforms, faster processor speeds, and OTT delivery that allows for video to be watched on pretty much any device. These exponential technology advances have had a tremendous impact on the media ind…

April 14, 2016

SECURITY

Designing Security and Trust into the Cloud

Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are…

April 12, 2016

SECURITY

Badlock Impact on Cisco Products

On April 12, 2016 the Samba.org project and Microsoft disclosed a vulnerability that is being referred to as Badlock.  The Cisco Product Security Incident Response Team (PSIRT) is currently investigating the impacts of this vulnerability on Cisco products. Based on our initial analysis of the vulner…

April 11, 2016

SECURITY

Solving the Security Patchwork Problem

Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ differ…

April 7, 2016

SECURITY

Tackle the Cybersecurity Problem with a Best Practices Approach

It’s late in the day, and the Chief Information Security Officer walks over to you. She asks you a single question: “How do you think about cybersecurity?” The question catches you by surprise. How do I think about cybersecurity? So many things run through your mind at once: Do I think about it in t…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security