Cisco Blogs

Search Results

91 posts found

Driving Conversations on Cybersecurity in the Public Sector

…broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. Against this backdrop, it’s more important than ever to be constantly discussing and innovating cybersecurity measures to keep networks safe. Cisco is not only an industry leader when it comes to providing cybersecurity solutions and services for the public sector, but it is also helping drive conversations with…

Read More >>

Tags: , , , , , , , , , , , ,

#CiscoChat: Incident Response in a Complex Threat Environment

…anies nearly $500 billion in 2014. From Snowshoe Spam to Flash and JavaScript exploits, attackers have been relentless in developing new techniques to gain cyber footholds. Understandably, the world’s attention is focused on cybersecurity like never before, prompting even government officials at the highest levels to weigh in on the subject. In studies conducted by Cisco, we’ve learned that 75 percent of all cyber attacks take just minutes to…

Read More >>

Tags: , , , , ,

NAB 2015 Attendees: Is Your Security Model Threat-Centric?

…ion of an integrated threat-centric security model, which anticipates, protects and contains security vulnerabilities across the threat continuum. A threat-centric security model defines what to do before, during and after a security breach. In other words, comprehensive security – firewalls, content encryption and access control methods, for example – are critical preparations for an attack, but are they enough? We need to be able…

Read More >>

Tags: , , , , , , , , , , , ,

Combating Cyber-Attacks Through Cyber Intelligence & Security: Part One

…l entities need to gather enough intelligence to be able to react. The current cross-industry information sharing process is not as robust as it could be, but it’s a work in progress as evidenced at the White House Summit on Cybersecurity. For example, if there’s an exploit in software that Utility A knows about, they should have a way for Utilities B, C and D to obtain access to that information and quickly patch that vulnerability. Without…

Read More >>

Tags: , , , ,

Cisco Launches Security Incident Response Services

…tion through identification, isolation and remediation using analysis and data mining, forensic image analysis, infected system dynamic instrumentation, malware reverse engineering and exploit analysis and re‐implementation. Cyber Security Readiness As businesses fall victim to increasingly targeted cyber-attacks and data breaches, they need external expertise to assess and promote security best practices as well as to protect corporate data and…

Read More >>

Tags: , ,