#Security
Security Simplified, Introducing Cisco SecureX
What a whirlwind week it’s been here at the RSA Conference. There was so much to see and to learn. At RSA this year, Cisco showed up in a big way. On Monday, February 24th we had an exciting new announcement–the unveiling of our new platform that will redefine security, Cisco SecureX. Cisco S…
AMP for FedRAMP: Relentless Breach Defense
Cyberthreats targeting Federal government IT are becoming increasingly evasive and complex. That’s why Federal agencies are rethinking their legacy antivirus solutions. And the best place to start? FedRAMP. Because a FedRAMP Authorized solution means strong, risk-based security that meets stringent…
What’s New in Security and Compliance for Webex
Three New Security Features in Control Hub Security and compliance are top of mind for large customers when deploying collaboration solutions. In today’s modern and digital workplaces, collaboration spans organizational and functional boundaries and employees inevitably share sensitive data and inte…
Time for Some Straight Talk Around Network Traffic Analysis
According to research from the Enterprise Strategy Group, 87% of organizations use Network Traffic Analysis (NTA) tools for threat detection and response today, and 43% say that NTA is a “first line of defense” in case of an attack. The increasing IT complexity is one of the main factors in the adop…
Connecting the dots (and the data) for a better retail environment
One of the critical themes that came up repeatedly from customer and partner conversations at #NRF2020 is how to connect multiple points of data across a customer journey. Although the shift to Ecommerce has grown immensely, we know that the brick-and-mortar store remains an important engagement poi…
Disk Image Deception
Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tacti…
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
Guest Author: John Sellers, Stealthwatch for Public Sector at Cisco. Educational institution systems store a large amount of sensitive data, including student and employee records. They rely heavily on these systems for day-to-day operations. So any disruption or loss of access can be a game changer…
The 3 W’s in Zero Trust Security
Picture this scenario: you are a security guard at an office building. Today you are looking after a restricted area. A person you’ve never seen before walks straight past you into one of the rooms. Would you stop them or would you just assume they are allowed to be there? In a physical world, trust…
The Gift that Keeps on Giving All Year Round
The holiday season is upon us! It’s that time of the year for trying to painstakingly think of the perfect gift. Don’t get stuck gifting your customers with the proverbial firewall “fruit cake”. Here’s an idea: Gift your customers a modern firewall that will lay the foundation for a secure network.…