Security Services

January 9, 2018

SECURITY

Security or Innovation?

I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In ord…

January 8, 2018

SECURITY

Incident Response: Are you ready?

I am a big proponent of “what if” planning. Are you? I spin through what-if scenarios every day. Sometimes I ponder unlikely events, like: what would I do if I came across a bear while hiking in the forest? Or, a more positive but equally unlikely example: what if I won a million dollars? Either way…

November 29, 2017

SECURITY

Dissecting a Breach: The Process of Incident Response

On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.”  This webinar will describe how our team performs incident handling within the service and what you should expect during an…

November 6, 2017

CUSTOMER EXPERIENCE

Prevention or Cure? Focusing your Cybersecurity Efforts and Investments

An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organization against the imminent threat of a cyber attack, it’s essential to factor in both. Here’s why. Today’s hackers are motivated and more organized than ever. This past year has shown how vul…

November 2, 2017

SECURITY

Extend Your Security to the Cloud with Confidence

Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when…

October 19, 2017

SECURITY

Business Critical Security

Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts:  when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train yo…

October 11, 2017

SECURITY

Security in Your DNA: Tips for Securing Your Network

Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation on your network to full advantage? How do you validate that the existing policy aligns with the…

July 5, 2017

SECURITY

GDPR: Start Your Privacy Protection Planning Now

One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries fro…

May 31, 2017

SECURITY

The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing,…