cybersecurity
“Time to Evolve” Analysis Yields New Insight on Malware Obfuscation Techniques and Adds Dimension to “Time to Dete …
[Blog authored by Aaron Weis and Samuel Wigley] Cisco has been measuring our security products’ median “time to detection” (TTD) — the window of time between a compromise and detection of a threat — since 2015. This exercise is a way for us to benchmark our progress, and continually refine our appro…
Addressing Healthcare Security Challenges
It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most co…
Three Essential Elements of a Reliable Cyber Resilience Strategy
Next week’s NCSA Nasdaq Cybersecurity Summit in New York will focus government and private sector leaders on two priorities—developing a strategic approach to combating pervasive cyber threats and creating a culture of cybersecurity across enterprises. These are critical issues that Cisco is address…
Service Provider Security Architecture – Part 2
In my earlier blog post, I described the need for pervasive security and architectural approaches to enable secure, agile services against increasingly sophisticated attackers. Pervasive security is critical to the Open Network Architecture (ONA). But what does pervasive security actually mean? Si…
When It Comes To Protecting Data, Cisco Services Goes All-In
Yes, it’s official! Cisco successfully completed the ISO 27001 Certification across our entire services business worldwide. This important certification reinforces our commitment to protecting Cisco and our customers. With Cisco as a trusted partner, customers can be confident that every possible sa…
Service Provider Security Architecture – Part 1
There has never been a more interesting time to be a Service Provider. Today, we are in the midst of a once in a generation transition in technology that we last saw with the birth of the internet. Today, the exponential growth in hyper-connectivity, the services that evolve upon it and the dawn o…
Welcome to Cybersecurity in Public Sector
It’s like the scene in a movie when the good guy pulls out a knife thinking he has the upper hand over the villain…. and out of nowhere the bad guy pulls out an AR-15 automatic rifle! Fight over. Good guy goes down and loses. Welcome to cybersecurity in Public Sector. Agencies in Public Sector (g…
Recognized Excellence in Trustworthy Product Development and Pervasive Data Protection
I am proud to announce that last week at RSA the 2017 Info Security Products Guide Global Excellence Awards honored three teams from the Cisco Security and Trust Organization. These teams were recognized for their work in defending the company’s networks, building secure and trustworthy products and…
Seeing Security in a New Light
The most dangerous threats to your organization are the ones you can’t see or stop. Cybercrime is on the rise—and the healthcare industry is particularly vulnerable because of the value of the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat lands…