Security Services

October 30, 2018

SECURITY

Cisco Recognized as a Leader in Incident Response

It is never ideal to “go it alone” during a cybersecurity breach. Talk about a high-pressure situation.  Getting access to experts is critical: with a strong support team, you’ll have more hands on deck so you can act quickly, and when you tap into skilled incident response experts, you have the ben…

October 27, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 2)

In part 1 of this series of posts, we covered what constituted a War Game and how we defined the various attack scenarios. In this part, we will cover our Cisco Security Advisory Services team used these scenarios to develop real world threat models and establish other parameters of the engagement.…

October 20, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 1)

Recently, in what was an interesting change to the usual technical and risk/compliance focused consultancy, our Security Advisory Services carried out a War Games exercise – which is similar in style to a “red team” engagement. This short series of posts aims to describe the experi…

August 22, 2018

SECURITY

Securing the Cloud: Assessing the Security of TLS

As more and more organizations move from self-hosted infrastructure to cloud-based environments, so too increases the demand to ensure that they are resilient and secure. As part of Cisco’s efforts to support our customers in making this change in a smooth and seamless fashion, we have been hard at…

July 23, 2018

CUSTOMER EXPERIENCE

Security: Is it Mission Impossible?

International intrigue. Rogue actors. Cybercrime. You might think I’m talking about Tom Cruise and his record-breaking sixth “Mission Impossible” movie. But I’m not. I’m talking about what happens to enterprises with a frequency that is a lot higher than most people suspect. Daily—sometimes hourly—t…

July 9, 2018

SECURITY

Putting the “Active” Back in Proactive Security: Tabletop Exercises

As security practitioners, we have the seemingly impossible task of defending an ever-changing environment. It seems like every time we get close to compliance, new vulnerabilities and threat vectors are discovered. So, we continually practice and plan, knowing that we have to be right all the time,…

July 5, 2018

SECURITY

Service Provider Digital Transformation and Security

For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the new technologies or in the process of early adoption and implementation–with a majority just beginning t…

June 6, 2018

SECURITY

The Importance of Logs

It’s funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational Security team aligning with platform and application support teams to build the projects the business wanted. Very soon after I joined it…

The 3 Ps of Comprehensive Cybersecurity

There is no question that the threat of cybersecurity breaches is business impacting in our ever-increasing connected world. There are two data points that I like to use on this matter to illustrate the impact: According to a CIO Insight survey, 71% of executives surveyed said that concerns over cy…