Cisco Blogs

Search Results

91 posts found

#NCSAM: Cisco’s Cyber Security Story

As National Cyber Security Awareness Month (NCSAM) arrives, now is a good time to look at the rapid expansion of information growth. We believe that cyber security centers around an important question that all who serve, protect and educate should consider – if you knew you were going to be compromised, would you prepare security differently? It’s no longer a matter of “if” an outside party will infiltrate a system, but “when.” We read…


Tags: , , , ,

Part Three: IT & OT, Utilities – The Need and the Opportunity

…t contacts suppliers, knowing the utility will likely need additional transformers and poles to replace damaged ones. In contrast, utilities have limited experience responding to a coordinated cyber-attack. They tend to view cybersecurity incidents as a technical problem and often relegate them to IT. Today’s cybersecurity events are becoming more and more like natural disasters, so much so that the Department of Homeland Security is staging its…


October is Cybersecurity Awareness Month: Marking the 11th Annual #NCSAM

…onth (NCSAM), sponsored by the U.S. Department of Homeland Security. Throughout the month the Department of Homeland Security and other government agencies will be hosting various events throughout the country to discuss new cybersecurity issues, our cybersecurity infrastructure and our ability to prevent and mitigate national cyber threats. NCSAM is not just about cybersecurity practices for the government but also to educate adults and…


Tags: , , , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

…g the costs and complexity of evolving toward dynamic controls. Just as dynamic designs are better protecting buildings from the damage caused by earthquakes, so too can dynamic controls help security practitioners better protect their organizations. With a new baseline of visibility and intelligence, and the ability to dynamically apply controls, companies can now rapidly adapt security policies and enforcement in real time to minimize the…


Tags: , , , , , , , ,

You’re Only as Secure as Your Weakest Link: Operationalizing Security

…ng with the Chief Information Security Officer (CISO) of a large enterprise recently, we were somewhat taken aback by his candid feedback that the quickest way to still draw business attention – and funding – for cyber security projects, is to suffer an actual breach! The Cisco 2014 Midyear Security Report highlights the various weak links existing in systems that can expose organizations to cyber security risks. No matter how many…


Tags: , , ,