Cisco Blogs

Search Results

386 posts found

Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center

…hes impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats. There was a common theme among all the recent data breaches shown below and that is the amount of time for initial detection, which is in weeks and…

Read More >>

Tags: , , , , , , , , , , , , , , ,

Partner Voices: Back to the Future. Lifecycle Management in 2014.

…rt with a baseline and a plan to remediate the most serious issues, and let’s be clear, this doesn’t always mean security. Product maintenance lapses could leave an organization just as vulnerable as a cyber-attack. Infrastructure elements that are not under a valid services contract could be the biggest security risk you face. What happens if a device goes down but you can’t get that product replaced because it’s not covered? Are you willing to…

Read More >>

Tags: , , , ,

Driving Agility and Innovation Through Software

In the US, this is the time of year when holiday shopping kicks into high gear. From Black Friday to Cyber Monday and beyond, retailers begin their big push to drive nearly a quarter of their annual revenue. And whether their customers are online or inside a traditional store, retailers today have the ability to understand shopper behavior better than ever before. This information – from purchasing patterns and advertising effectiveness to dwell…

Read More >>

Tags: , , , , ,

Key Considerations for Threat-Based Security Programs

As we often say at Cisco, every business is a security business. That’s been true ever since widespread online presence led to widespread cyber threats. It became even more applicable as those threats became more sophisticated and less detectable. And now, with the Internet of Everything (IoE), that phrase is more relevant than ever before. Cisco estimates that by 2020, 50 billion devices will be connected, whether you know it or not. Other adva…

Read More >>

A Model for Evaluating Breach Detection Readiness

…nd spot for oneself, traits that are hidden from others, and the unknown traits. A similar model can be used for cyber security breach readiness too. The Johari Windows model for evaluating breach detection readiness of an organization looks like this Open/Arena This window represents traits of a breach that are known to the analyst as well as known to others (which could be security researchers, open threat communities or even adversaries). Exa…

Read More >>

Tags: , , ,