#Security

February 28, 2020

PARTNER

Security Simplified, Introducing Cisco SecureX

What a whirlwind week it’s been here at the RSA Conference. There was so much to see and to learn. At RSA this year, Cisco  showed up in a big way. On Monday, February 24th we had an exciting new announcement–the unveiling of our new platform that will redefine security, Cisco SecureX. Cisco S…

February 20, 2020

GOVERNMENT

AMP for FedRAMP: Relentless Breach Defense

Cyberthreats targeting Federal government IT are becoming increasingly evasive and complex. That’s why Federal agencies are rethinking their legacy antivirus solutions. And the best place to start? FedRAMP. Because a FedRAMP Authorized solution means strong, risk-based security that meets stringent…

February 10, 2020

COLLABORATION

What’s New in Security and Compliance for Webex

Three New Security Features in Control Hub Security and compliance are top of mind for large customers when deploying collaboration solutions. In today’s modern and digital workplaces, collaboration spans organizational and functional boundaries and employees inevitably share sensitive data and inte…

January 28, 2020

SECURITY

Time for Some Straight Talk Around Network Traffic Analysis

According to research from the Enterprise Strategy Group, 87% of organizations use Network Traffic Analysis (NTA) tools for threat detection and response today, and 43% say that NTA is a “first line of defense” in case of an attack. The increasing IT complexity is one of the main factors in the adop…

January 17, 2020

RETAIL AND HOSPITALITY

Connecting the dots (and the data) for a better retail environment

One of the critical themes that came up repeatedly from customer and partner conversations at #NRF2020 is how to connect multiple points of data across a customer journey. Although the shift to Ecommerce has grown immensely, we know that the brick-and-mortar store remains an important engagement poi…

January 15, 2020

SECURITY

Disk Image Deception

Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tacti…

December 23, 2019

EDUCATION

Ransomware in Education: How to use your Network to Stay Ahead of Attacks

Guest Author: John Sellers, Stealthwatch for Public Sector at Cisco. Educational institution systems store a large amount of sensitive data, including student and employee records. They rely heavily on these systems for day-to-day operations. So any disruption or loss of access can be a game changer…

December 20, 2019

SECURITY

The 3 W’s in Zero Trust Security

Picture this scenario: you are a security guard at an office building. Today you are looking after a restricted area. A person you’ve never seen before walks straight past you into one of the rooms. Would you stop them or would you just assume they are allowed to be there? In a physical world, trust…

December 18, 2019

PARTNER

The Gift that Keeps on Giving All Year Round

The holiday season is upon us! It’s that time of the year for trying to painstakingly think of the perfect gift. Don’t get stuck gifting your customers with the proverbial firewall “fruit cake”. Here’s an idea: Gift your customers a modern firewall that will lay the foundation for a secure network.…