2014 annual security report

April 17, 2014

DATA CENTER

Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

4 min read

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]

April 8, 2014

SECURITY

Drivers for Managed Security and what to look for in a Cloud Provider [Summary]

1 min read

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations can let business needs […]

April 8, 2014

DATA CENTER

Drivers for Managed Security and what to look for in a Cloud Provider

3 min read

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations […]

March 6, 2014

DATA CENTER

Data Security Through the Cloud

1 min read

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]

March 5, 2014

SECURITY

January 2014 Threat Metrics

2 min read

January 2014 started with a bang, with one in every 191 web requests resulting in a web malware encounter. The Cisco Computer Security Incident Response Team (CSIRT) observed this same trend, witnessing a 200% increase in web malware encounters experienced by Cisco employees for the month. Overall, January 1, 25, and 26 were the highest […]

February 28, 2014

SECURITY

Introducing Cisco Cognitive Threat Analytics

4 min read

“There is no silver bullet.”  That’s one of our favorite sayings at Cisco Security. We use it to convey the point that malware prevention is not 100%. As new attack...

February 26, 2014

SECURITY

Malware is Everywhere. Now, so is Advanced Malware Protection from Cisco.

3 min read

Malware is everywhere and it’s incredibly challenging to combat, using whatever unprotected path exists to reach its target and accomplish its mission. Malware has become the weapon of choice for...

February 24, 2014

SECURITY

What will Security for the Network of the Future Look Like?

3 min read

In the next few years, there will be more mobile users and more mobile connections than ever: By 2018, there will be 4.9 billion mobile users, up from 4.1 billion in 2013, according to the newly released Cisco VNI forecast In addition, there will be 10 billion mobile-ready devices and connections, which includes 8 billion […]

January 22, 2014

SECURITY

Cisco 2014 Annual Security Report: Why the Before/During/After Approach to Security Offers Better Protection from Threat …

2 min read

The number and variety of threats that can infiltrate corporate networks and disable critical infrastructure are sobering. Take a look at our findings and analysis in the new Cisco 2014 Annual Security Report, and you’ll see that malicious actors are innovating just as fast as security professionals do. As threats proliferate, so do the solutions […]