Security Services
Security or Innovation?
I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In ord…
Incident Response: Are you ready?
I am a big proponent of “what if” planning. Are you? I spin through what-if scenarios every day. Sometimes I ponder unlikely events, like: what would I do if I came across a bear while hiking in the forest? Or, a more positive but equally unlikely example: what if I won a million dollars? Either way…
Dissecting a Breach: The Process of Incident Response
On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during an…
Prevention or Cure? Focusing your Cybersecurity Efforts and Investments
An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organization against the imminent threat of a cyber attack, it’s essential to factor in both. Here’s why. Today’s hackers are motivated and more organized than ever. This past year has shown how vul…
Extend Your Security to the Cloud with Confidence
Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when…
Business Critical Security
Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts: when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train yo…
Security in Your DNA: Tips for Securing Your Network
Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation on your network to full advantage? How do you validate that the existing policy aligns with the…
GDPR: Start Your Privacy Protection Planning Now
One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries fro…
The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response
Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing,…
1