Zero Trust
Cisco Identity Services Engine wins…again!
For the fourth time in the last five years, Cisco Identity Services Engine (ISE) was recognized as the top solution in the Trust Awards category for Best NAC Solution at the 2020 SC Awards. The announcement was made on Tuesday, February 25, 2020 during the 24th annual SC Awards gala in San Francisco…
Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust
Cisco’s recently released their 2020 CISO Benchmark Report that makes several key recommendations for security professionals to achieve a zero trust vision. The following are a couple of recommendations that are relevant to the discussion in this blog regarding device trust: More than half (52%) of…
Starting Your Microsegmentation journey
One of the key challenge’s businesses face is how to provide a secure infrastructure for applications without compromising agility. With the rise of cloud usage, containers, and microservices, many companies choose microsegmentation as the means to protect critical applications from compromise. Ch…
A 20/20 Vision for Cybersecurity
As a CISO, where do you see your organization going this year? Perhaps some 20/20 vision could help? If you can forgive the pun, I’m delighted to announce Cisco’s 2020 CISO Benchmark Report. This year we have combined our current standing in the Gregorian calendar with the notion of perfect eyesight…
4 Cybersecurity Trends that Will Make an Impact in 2020
My cybersecurity trends outlook for 2020 builds on my forecast for 2019. Identity and application security are still top-of-mind this year, but in new and more advanced ways. As we approach RSA 2020, these are four trends in cybersecurity that I expect will make an impact this year. 1. Zero Trust g…
The Voice of the CISO Customers – CISO Day in Europe
As part of the activities surrounding Cisco Live Barcelona, we held a very special event specifically tailored for our CISO customers: Cisco CISO Day. It was a full day of exploring topics curated for this executive audience, and an opportunity for them to connect with peers in the security industry…
Datacenter Security: How to Balance Business Agility with Great Protection
When IDC consults with enterprise customers or performs worldwide surveys, security is invariably an acute concern. That’s regardless of geography, industry, and identity of respondent (executive, LoB, IT, DevOps, etc.). While the challenge of providing protection and security extends across all pla…
The 3 W’s in Zero Trust Security
Picture this scenario: you are a security guard at an office building. Today you are looking after a restricted area. A person you’ve never seen before walks straight past you into one of the rooms. Would you stop them or would you just assume they are allowed to be there? In a physical world, trust…
Anomaly Detection in Complex Systems: Zero Trust for the Workplace
Zero trust and complexity management represent a new basic combination for a closed-loop approach to anomaly detection and mitigation for critical infrastructures. This abstract introduces a set of functional blocks that could enable automation and assurance for secure networks. These blocks are des…