Security
Threat Hunting: How to Gain the Most Value
Sean Mason, Director of Cisco Incident Response Services and Jeff Bollinger, Investigations Manager, Cisco Security Incident Response Team (CSIRT) As security practitioners who continuously look for adversarial malice, one of the questions we are asked frequently is: What’s around the corner? Threat…
Security in A World of “WE” – Embracing Our Third Party Ecosystems
In our increasingly digital world, technological innovation not only presents new opportunities, but also raises new risks and challenges that must be addressed collaboratively by industry, buyers, users, and policymakers. Specifically, digitization demands that risk be addressed across a dramatical…
Duo and ISE Integrated Use Case – Delivering Zero Trust security for the workforce and workplace
This blog series will highlight exciting new developments and integrations between solutions within the Cisco Security portfolio with our acquisition of Duo Security. These posts will cover details about the problems that are being solved by these integrations with links to helpful technical documen…
Find What Your Endpoint Anti-Malware is Missing with CESA Built on Splunk
There are many aspects to securing an endpoint beyond finding the malware on it. What do you know about the behavior of your endpoints? Can you track anomalous traffic? Can you tell what the applications and other software processes are up to? What is happening when the device is off the corporate…
Our World in Transition and Our Future Demands
October is Cybersecurity Awareness Month and for me, it’s a time to reflect on where we’ve been and how far we’ve come, study the trends and challenges we face today, and look ahead to the next generation of opportunities facing not only the security community, but society at large. In my more than…
Threats in encrypted traffic
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troub…
Cisco Security Supporting NATO’s Largest Cybersecurity Conference
NIAS is NATO’s largest cyber security conference and provides an opportunity for NATO and government leaders, defence and cybersecurity specialists to discuss needs and priorities and effective cyber security solutions. NATO’s mission is to protect the freedom of its members. It has innovated and ad…
DevSecOps: Blending Critical Operations and Cultures to Increase Data Security
Two major shifts are affecting organizational cybersecurity posture: digital product and service offerings are increasingly powered by mobile, cloud and data analytics; while developers of those products and services are migrating to Development Operations (DevOps) processes for greater agility and…
The Criticality of the Network in Securing IoT and Critical Infrastructure
Security is the key to the success of any digital project, whether you are connecting critical infrastructure, industrial Internet of Things (IoT), or delivering data and telemetry to reduce costs and increase revenue. We have long advocated the need for a holistic approach to IoT security, and with…
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171458-Screen-Shot-2020-01-17-at-12.13.39-PM-150x150.png)
Why Cisco Security?
Explore our Products & Services
![](https://alln-extcloud-storage.cisco.com/Cisco_Blogs:blogs/1/2020/01/IL20200117171933-Screen-Shot-2020-01-17-at-12.14.33-PM-150x150.png)
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security