Cisco Advanced Malware Protection

October 12, 2020

SECURITY

Threat Trends: Endpoint Security, Part 2

9 min read

In this blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact in defending your assets, especially if dealing with limited security resources.

October 28, 2016

SECURITY

To be Effective, Security Must be Simple, Open, and Automated

4 min read

Organizations must take advantage of the digital economy in order to succeed and grow. But to do this, and do it securely, we can’t be compromised by complexity. Our IT landscapes are often systems cobbled together over the years. We may have servers from 15 years ago and cloud apps from 15 minutes ago. We […]

June 8, 2016

SECURITY

AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

2 min read

No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping...

June 8, 2016

SECURITY

When you need complete privacy: An on-premises private cloud

2 min read

Do you dream of keeping your data under a lock and key that only you control? Or are you trying to appease regulations, whether corporate or government mandated? Organizations should not fear the auditor more than the attacker. While many have come to adopt the cloud, there are cases where it might not be for […]

June 6, 2016

SECURITY

Incident Response Goes to Hollywood

2 min read

Having personally spent a lot of time at Fortune 500’s, I know that individuals tend to develop blinders when dedicated to an organization, and begin to accept that things are done a certain way, and there is an order about things. It may come as a surprise then, when others don’t do things the way […]

April 11, 2016

SECURITY

Solving the Security Patchwork Problem

3 min read

Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ different security […]