Cisco Blogs

Search Results

363 posts found

Part Four: IT & OT, Utilities – IT and OT, Corporate Change

…ng both the collaboration and the value that companies need as the result. Cisco has a portfolio of leading edge Cyber and Physical Security solutions. Cisco’s Advanced Services offerings help our customers develop and deploy a collaborative, unified approach to encourage the best results from the collaboration and convergence of IT and OT.  Are you up to date on Cisco’s solutions and capabilities? We are here to help! Part Four: IT & OT, Uti…

Read More >>

Three Deciding Factors To Reach A New Digital World

…hey will lose their ability to innovate and their relevance to the business. When everything moves to digital, cybersecurity takes the center stage. A series of recent cyber breaches exposed the security vulnerability of many businesses and organizations. In the cyber breach at J.P. Morgan Chase, contact information of 76 million customers of the largest US bank was stolen. “This is among the most troubling breaches ever — and not just be…

Read More >>

Tags: , , , , , , ,

#NCSAM: Cisco’s Cyber Security Story

As National Cyber Security Awareness Month (NCSAM) arrives, now is a good time to look at the rapid expansion of information growth. We believe that cyber security centers around an important question that all who serve, protect and educate should consider – if you knew you were going to be compromised, would you prepare security differently? It’s no longer a matter of “if” an outside party will infiltrate a system, but “when.” We read abo…

Read More >>

Tags: , , , ,

Cisco to Provide Secure Ops Solution to Royal Dutch Shell

…Secure Ops Solution provides remote proactive monitoring and Service-Level-Agreement -(SLA)-driven management of security, applications and infrastructure.  At the IoTWF Shell shared that it has deployed the Cisco Secure Ops Solution to increase the security maturity level by improving its cyber security and risk management, while lowering costs of delivery and operations. When you think about all the challenges that oil and gas industry companie…

Read More >>

Tags: , , , , , , ,

Evolution of the Nuclear Exploit Kit

…recent weeks, the Nuclear exploit kit has shown a marked increase in activity. Exploring their traces within our security telemetry demonstrates how the attack evolved. Looking at the number of blocks recorded by Cisco’s Cloud Web Security service attributable to the Nuclear exploit kit shows that the campaign started during mid-August, reached a peak on September 18, then rapidly tailed off. During this time, we observed the malware being hoste…

Read More >>