Cisco Blogs

Search Results

412 posts found

IoT, The Oppressed Project

…onitoring, logistics monitoring and management. Due to the global connectivity and sensitivity of applications, security in real deployments in the IoT is a requirement. Cisco is very clear about IoT Security: “IoT security requires a new approach that combines physical and cyber security components.” Learn how Cisco can help you more securely implement the opportunities and benefits the IoT can bring.  IoT Security Please watch this video, whe…


Tags: , , , ,

Cisco Annual Security Report 2015: Secure Access for Defending Against Threats

…, and the need to secure a new class of connected devices, the Internet of Things (IoT), the attack surface for cyber threats has increased significantly. NAC has evolved into a technology that has become a critical component in the defense against cyber intrusions and data theft. While Cisco still uses the term “NAC” to describe our offerings since it is the most identifiable term, Enterprise Security Group—a well-known analyst research company—…


Tags: , , , , , ,

Live at DistribuTECH – Wednesday Recap

…d Approaches. The panelists addressed compliance approaches for the updated standard, aimed at fending off both cyber and physical attacks. Panelist gave their views on identifying assets and how to address monitoring and controls. Other panelists made it clear that perimeter defense is one of the many tools but by no means the only tool to address grid cyber security. Security teams should focus on approaches that encompass intelligence. Hacktiv…


Tags: , , , , ,

Cisco Demonstrating Solutions for a variety of utilities needs at DistribuTECH

…ring and control across your network communications by supporting integration with application layer platforms. Security If some of your more pressing needs are around security, you will get a first-hand look at a better way to manage cybersecurity risk in industrial control networks and critical infrastructure networks. The Secure Ops demo will showcase situational awareness and compliance dashboards that make it easier to manage assets and se…


Tags: , , , , , , , ,

Cisco Cloud Security Architecture: Un-Cloaking Invisible Threats

…ing to many of us, to be constantly engaged in the never ending cat and mouse game we play to manage and detect cyber threats. When it comes to securing private and public clouds, a new generation of security architecture is needed to help us protect business assets. Here at Cisco, we have worked with large enterprises, service providers and security experts to develop a threat-focused, next generation security architecture that stops and detects…


Tags: , , , , , , ,