Risk Management

October 18, 2023

SECURITY

The Overlooked Risks in Supply Chain Security

1 min read

Your business's security is only as strong as your supply chain. Discover the overlooked risks and expert insights.

October 24, 2022

SECURITY

Ensuring Security in M&A: An Evolution, Not Revolution

6 min read

Through decades of acquisitions, Cisco has gained the expertise and experience to make M&A seamless and successful by making cybersecurity a priority throughout the integration process.

October 17, 2022

SECURITY

Making Merger and Acquisition Cybersecurity More Manageable

4 min read

Part of the secret to Cisco’s success is its ability to acquire companies that strengthen its technology portfolio and securely integrate them into the larger organization.

January 9, 2018

SECURITY

Security or Innovation?

1 min read

I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In order to foster innovation at […]

April 14, 2016

GOVERNMENT

Cybersecurity for Defense: Cisco Supports the NIST Risk Management Framework

2 min read

In our Cybersecurity for Defense Blog Series Kickoff, Peter Romness mentioned that we at Cisco are hard at work delivering advanced cybersecurity capabilities that support the Department of Defense Cyber Strategy. That’s certainly true, and each blog in our series will further that point. But it’s about more than just products and services. It’s also […]

September 30, 2015

EXECUTIVE PLATFORM

Cisco to Expand Security Consultancy Services with Acquisition of Portcullis

1 min read

There’s no question that cybersecurity is top-of-mind for Fortune 500 companies. This, compounded by a significant global security talent shortage, contributes to the burgeoning need for security companies to deliver...

January 6, 2015

SECURITY

Responsive Security in Action

4 min read

In 2013, our internal Information Security team carried out a series of controlled anti-phishing exercises. The purpose was to raise employees' awareness of potential spear phishing attacks through emails. Spear phishing has been a common first step for Advanced Persistent Threat (APT) attacks to gain access to a user's system before launching further attacks at internal targets. As such, if employees are vigilant against such attack patterns, we should effectively reduce the risk of successful APT attacks involving email phishing.

December 30, 2014

SECURITY

Getting More Responsive Security by Learning From Disaster Responses

5 min read

Editor’s Note: In the two previous blogs, we discussed some of the issues and dilemmas found within information security knowledge and practice domains. Those challenges arise fundamentally from the traditional approach that many organizations have adopted to address information security requirements. In this fourth installment, we look at how good preparation can improve security outcomes, […]