data breach
Security’s Vicious Cycle
Security Reimagined — Solving an Old Problem with a New Approach A decade ago this January, Steve Jobs challenged the conventional wisdom about tablets, unveiling the iPad with the words, “What this device has done is extraordinary.” Coming on the heels of iPhone’s smashing success three years earli…
A Look Back at the Major Cyber Threats of 2019
Today we launch our 2019 Threats of the Year report; a look back at the major tools and tactics that cybercriminals have exploited over the past year. Based on original research conducted for our ‘Threat of the Month’ blog series, we look into the impact of directed attacks against specific o…
Security Innovations: Four Compelling New Reasons to Choose Cisco Security
Kaizen, a Japanese word for “improvement,” is a term used in business to describe ongoing process improvement. The concept is simple: No process is perfect and, even if it’s working well today, the dynamic business environment could demand a change tomorrow. Kaizen is the relentless focu…
Cloud Unfiltered Podcast, Ep 22: Security Matters, with Bryan Doerr
You are officially forgiven if data breach headlines don’t surprise you anymore. I mean honestly, can there be anything scarier than a hacker having access to all the data we each have stored with Equifax? Equifax?! They’ve got my SSN, my address, my driver’s license, and all my credit card numbers.…
Incident Response Fundamentals – Communication
While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I have continued to see comes down to internal communications among those working on the incident and communications to stakeholders. To that point, it’s astonis…
Keeping up with Cybersecurity Threats in the Digital Age
Retailers are embracing and adapting to digital innovations to keep pace with rapidly-evolving customer demands. Online and mobile purchases continue to increase exponentially. According to Deloitte, 58% of consumers have used their mobile device to browse an online shopping website or app. In fact,…
The Need To Solve for Time
Ponemon Institute called 2014 the year of the “Mega Breaches,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many que…
Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center
Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, wel…
Naughty Users! Protect Your Endpoints From Users’ Bad Behavior
Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to f…