data breach

March 3, 2020

SECURITY

Security’s Vicious Cycle

Security Reimagined — Solving an Old Problem with a New Approach A decade ago this January, Steve Jobs challenged the conventional wisdom about tablets, unveiling the iPad with the words, “What this device has done is extraordinary.” Coming on the heels of iPhone’s smashing success three years earli…

December 12, 2019

SECURITY

A Look Back at the Major Cyber Threats of 2019

Today we launch our 2019 Threats of the Year report; a look back at the major tools and tactics that cybercriminals have exploited over the past year. Based on original research conducted for our ‘Threat of the Month’ blog series, we look into the impact of directed attacks against specific o…

November 13, 2018

SECURITY

Security Innovations: Four Compelling New Reasons to Choose Cisco Security

Kaizen, a Japanese word for “improvement,” is a term used in business to describe ongoing process improvement. The concept is simple: No process is perfect and, even if it’s working well today, the dynamic business environment could demand a change tomorrow. Kaizen is the relentless focu…

October 10, 2017

CLOUD

Cloud Unfiltered Podcast, Ep 22: Security Matters, with Bryan Doerr

You are officially forgiven if data breach headlines don’t surprise you anymore. I mean honestly, can there be anything scarier than a hacker having access to all the data we each have stored with Equifax? Equifax?! They’ve got my SSN, my address, my driver’s license, and all my credit card numbers.…

September 22, 2017

SECURITY

Incident Response Fundamentals – Communication

While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I have continued to see comes down to internal communications among those working on the incident and communications to stakeholders. To that point, it’s astonis…

February 6, 2017

RETAIL AND HOSPITALITY

Keeping up with Cybersecurity Threats in the Digital Age

Retailers are embracing and adapting to digital innovations to keep pace with rapidly-evolving customer demands. Online and mobile purchases continue to increase exponentially. According to Deloitte, 58% of consumers have used their mobile device to browse an online shopping website or app. In fact,…

August 6, 2015

SECURITY

The Need To Solve for Time

Ponemon Institute called 2014 the year of the “Mega Breaches,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many que…

December 18, 2014

SP360: SERVICE PROVIDER

Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center

Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, wel…

October 15, 2014

SECURITY

Naughty Users! Protect Your Endpoints From Users’ Bad Behavior

Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to f…