Cisco Blogs

Search Results

372 posts found

Why a Next-Generation Firewall Must Be Threat-Centric

…ther to protect against threats coming from multiple vectors. Other NGFWs have not offered best-in-class network security capabilities in their devices, but rather, rudimentary versions of them. In addition, these solutions are poorly integrated and cannot share intelligence between security layers, making advanced threat detection and remediation difficult, if not impossible. Threat-Centric = Integrated Threat Defense Across the Attack Continuum…

Read More >>

Tags: , , , , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

…ed to defend need to mature as well; and Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments. A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against — read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get…

Read More >>

Tags: , , , , , , , ,

Prepare for Data Breaches! They Will Happen … to Anyone

…eliminate these risks, but we can control and minimize them.Cisco Enterprise Network solutions provide built-in security such as Cyber Threat Defense and Policy Defined Network Segmentation to help defend against data breaches. The best part is, you already have most of these capabilities when you deploy Cisco routing, switching and wireless networks. You’ll just need to plan ahead and turn them on. On Sept 18, 2014 we hosted a live webcast on C…

Read More >>

Tags: , , ,

Addressing Cyber-Security Challenges of Today and Tomorrow

Did you know that Cisco detects over 1.5 million intrusion attempts on Cisco’s network every day? With more than 13 billion NetFlow records captured daily, over 22 Terabytes of traffic inspected, and 750 Gigabyte of system logs collected on a daily basis, it’s changing the landscape for how to secure intellectual property, confidential information, and mitigate malicious attacks. This brief video shares relevant security information, real-…

Read More >>

Tags: , , , , ,

Securing Mobile Data in the Event of Device Loss or Theft

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational…

Read More >>

Tags: , , , , ,