Cisco Blogs

Search Results

91 posts found

Cybersecurity: What Needs to Change Now

October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. At Cisco, we believe two key things must change in the security industry. First, we need to acknowledge that security is a strategy, and one that senior leaders in all organizations must embrace and own. Second, IT vendors—and all other…

Read More >>

Tags: , ,

IT Security: When Maturity is Overrated

…latest and anticipated cyber attacks. These defenses are constantly getting better and, as a result, continually evolve in our products and services. Our version of how we do this – from our secure development lifecycle, to security-centric features and functions, to supply chain security – is described at Cisco’s Trust and Transparency Center. Underpinning both new and old systems with strong operational practices is a must. We recommend good…

Read More >>

Tags: ,

The Need To Solve for Time

…ake of saving time and the pains of the readers going through some deeper math equations, which can be found in the Cyber Threat Defense Solution Architecture Guide, the resulting simplified approximation formula looks like: Cyber Attack Events = (Cyber Attackers) * (Attack Vectors * Probability of Being Attacked) * (Infrastructure Assets * Probability of Compromise) * (Assets of Interest * Probability of Successful Attack on Asset) Let say our…

Read More >>

Tags: , , , ,

Cybersecurity 101: Assessing the Threat & Mitigating Cyber Risks in Higher Education

…open learning environments make securing these institutions an even harder problem to solve. It is no longer a matter of whether or not you will be hacked, rather when. Higher education leaders are recognizing the need for a cybersecurity strategy that encompasses responsibility across the institution, from the boardroom to the classroom. Join The Chertoff Group and Cisco on June 24th with a panel of higher education security experts to learn…

Read More >>

Tags: , ,

Securing Your Industrial Networks by Aligning IT and OT

…er many advantages to O&G firms, including increased business agility and risk awareness, lower cost of operations, and reduced downtime. But before the industry can embrace these new strategies, an effective, end-to-end cybersecurity approach—including alignment between IT and OT—is needed. Security a Catalyst for Transformation Digital transformation means that a range of new and diverse devices are connecting to industrial oil and gas…

Read More >>

Tags: , , , , , , , , ,