Cisco Blogs

Search Results

89 posts found

Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center

…hs and 59% attacks may not be able to contained for weeks or months even after detection. Next Generation Cisco Cloud Security 1.0 architecture answers the challenges service provider is facing today by bringing a continuous security model with next generation cyber threat management, complete end-to-end visibility, and guidance on industry regulatory compliances Payment Card Industry (PCI), Health Insurance Portability and Accountability Act…


Tags: , , , , , , , , , , , , , , ,

Understanding and Addressing the Challenges of Managing Information Security – A More Responsive Approach

…nage the challenges in information security, practitioners need to be reflective in their practices and organizations need to focus on gaining visibility of risk, and constantly be prepared for critical re-alignment when the security (or risk) posture of the organization’s cyber environment changes. In the blog series that follows, I will discuss more about the issues and dilemmas of our current practices, what we mean by being responsive,…


Tags: , ,

Three Deciding Factors To Reach A New Digital World

…tions than a year ago. Without IT simplicity, IT departments will be rapidly consumed by day-to-day fire drills. They will lose their ability to innovate and their relevance to the business. When everything moves to digital, cybersecurity takes the center stage. A series of recent cyber breaches exposed the security vulnerability of many businesses and organizations. In the cyber breach at J.P. Morgan Chase, contact information of 76 million…


Tags: , , , , , , ,

#NCSAM: Cisco’s Cyber Security Story

As National Cyber Security Awareness Month (NCSAM) arrives, now is a good time to look at the rapid expansion of information growth. We believe that cyber security centers around an important question that all who serve, protect and educate should consider – if you knew you were going to be compromised, would you prepare security differently? It’s no longer a matter of “if” an outside party will infiltrate a system, but “when.” We read…


Tags: , , , ,

Part Three: IT & OT, Utilities – The Need and the Opportunity

…t contacts suppliers, knowing the utility will likely need additional transformers and poles to replace damaged ones. In contrast, utilities have limited experience responding to a coordinated cyber-attack. They tend to view cybersecurity incidents as a technical problem and often relegate them to IT. Today’s cybersecurity events are becoming more and more like natural disasters, so much so that the Department of Homeland Security is staging its…