Cisco Blogs

Search Results

356 posts found

Securing Mobile Data: What’s Your Plan?

…come more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focuse…

Read More >>

Tags: , , , , , , ,

Cisco Focus: The Year in Review

…y, some of our most popular “Focus” articles this year were: Bob Pittman Trailblazer  — Video issue Cyber Security Test your Knowledge -  Security issue Changing Role of the CSO — Security issue Rising Tides of Ed Tech — Tech Ed issue Human Body as Interface — IoE issue Smart Farming on the Vine — IoE issue All this effort comes from a small, but mighty social media communications team and I thank goodness that Cisco is lucky eno…

Read More >>

Tags: , , , , , , ,

Securing Employee Device Freedom

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. I’m excited to introduce a new blog series, authored by Kathy Trahan, which will explore the topic of enterprise mobi…

Read More >>

Tags: , , , , , ,

HAVEX Proves (Again) that the Airgap is a Myth: Time for Real Cybersecurity in ICS Environments

…nergy industry, and specifically power plants based in Europe, seems to be the primary target. See Cisco’s security blog post for technical details on this latest variant. When I discuss security with those managing SCADA, ICS and other OT environments, I almost always get the feedback that cybersecurity isn’t required, because their systems are physically separated from the open Internet. This practice, referred to in ICS circles as the “a…

Read More >>

Tags: , , , , , , , , , , , , ,

Is Your Team Prepared for a Cyber Attack? Get Ready with CyberRange Training

…r it. Seeing is believing: Today I am excited to share this video from our Cisco Korea team that showcases Cisco CyberRange. Cybersecurity threats pose a serious challenge, and there is nothing better than having a simulated environment that is adapted to the specific threats of your industry or vertical market. Many of the renowned standards for security call for similar training and exercises, which are sometimes referred to as “Red Te…

Read More >>

Tags: , , , ,