Black Hat

August 27, 2019

SECURITY

Black Hat USA 2019 Network Operations Center

Cisco Security is honored to be a supporting partner for the Black Hat USA 2019 Network Operations Center (NOC) for the third year; joining conference producer Informa Tech (formerly UBM) and its other security partners: RSA Security, Palo Alto Networks, Ruckus, CenturyLink and Gigamon. Cisco provid…

August 22, 2018

SECURITY

Securing the Cloud: Assessing the Security of TLS

As more and more organizations move from self-hosted infrastructure to cloud-based environments, so too increases the demand to ensure that they are resilient and secure. As part of Cisco’s efforts to support our customers in making this change in a smooth and seamless fashion, we have been hard at…

August 8, 2018

THREAT RESEARCH

Playback: A TLS 1.3 Story

Secure communications are one of the most important topics in information security, and the Transport Layer Security (TLS) protocol is currently the most used protocol to provide secure communications on the internet. For example, when you are connecting to your online banking application, your favo…

October 25, 2016

MANUFACTURING

The risk of doing nothing

Source: Edreformnow.org Have you ever told your team, “Upgrading our equipment is too expensive and likely to cause downtime. Let’s just keep it running.” Ultimately, you made a risk decision. While cyber security hasn’t been a critical risk factor until recently, it has quickly emerged as one of to…

July 27, 2016

SECURITY

The Official Talos Guide to Black Hat 2016

There is always something of an air of anticipation in the Security community as we approach Black Hat and DEFCON. This is your official guide to what Cisco’s Talos Threat Intelligence team is doing at Black Hat 2016. There are a lot of classes, great talks, technical deep-dives, late parties,…

May 5, 2014

SECURITY

The Continuum Approach for Secure Mobility

A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top prio…

Hacking Made Easy – Courtesy of IoT

For most of us, technology has become an integral part of our daily lives and promises to become even more prevalent in the near future due to the emerging technological revolution called the Internet of Things (IoT). The number of connected objects now exceeds the world’s human population, and is e…