Cisco Blogs

Search Results

396 posts found

New IT Harvest White Paper: How Policy-Based Software Defined Segmentation and Cisco TrustSec Improve Security

…rther, it argues that Cisco TrustSec provides the right technology for leveraging the network to provide better security. Mr. Stiennon discusses how the rise of sophisticated and dedicated attackers has left traditional access controls as a meager defense due to a reliance on enforcement that is mainly located at the perimeter. These attackers include well-funded nation states, cyber-criminal organizations, and of course malicious insiders as wel…

Read More >>

Tags: ,

Welcome Matt Morris to the Cisco Energy Industry Blog

…, or appeared at, many events, conferences and shows as a Subject Matter Expert (SME) for Cisco in the areas of security and threat response : ShaleCom West – Network Security: Keeping Outsiders off your Network and out of your Data. April 22, 2014. DistribuTECH 2014, San Antonio, Texas, January 28-30th, 2014 ICS Cyber Security Conference 2014, Atlanta Georgia, October 20-23rd, 2014 Recently, Matt lead the launch of the Secure Ops Solutio…

Read More >>

Tags: , , , , , , , ,

Setting the record straight: Enterprises should not block personal Wi-Fi as a general rule

…asked the FCC to declare that “the mere presence of a personal hot spot or ad hoc client does not constitute a security threat in any venue or physical location where the public is routinely present or invited. “ This is consistent with our view that everyone should have the expectation of using unlicensed airwaves on FCC-approved devices. But what if the enterprise’s managed Wi-Fi network comes under cyber attack, such as a denial of service at…

Read More >>

Getting More Responsive Security by Learning From Disaster Responses

…rther losses while the company addressed the underlying weaknesses. As observed, a key attribute for responsive security is preparation—be ready to respond. Techniques such as scenario planning, fire drills, and tabletop exercises are all proven methods for preparing organizations for disaster recovery and business continuity. Many of these similar tools and methods are used in preparing organizations to be ready and responsive to cyber security

Read More >>

Tags: , , ,

Cloudy with a Chance of Scalable Malware Protection

…– all linked by cloud services. To some the cloud is an attack vector while to others it’s a business enabler. Security as a Service bridges these two definitions to deliver the scale of cloud engines to address security challenges found anywhere in the Modern Network, whether physical, virtual, local or remote. Two recent stories from our Cloud Web Security (CWS) Service , illustrate the power of the cloud to address security concerns. The firs…

Read More >>

Tags: ,