Challenging the Status Quo, and Conquering the Fear of Failure
Hear Chris Leach's journey from accountant to CISO, as well as a rewatch of the film Hackers to celebrate its 25th anniversary!
Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave
Cisco has been named a leader in the 2020 Forrester Zero Trust Wave. Thank you to our partners and customers for helping us push the envelope and trusting us.
From Firewalls to Firewalling – The Future of Enterprise Security
Now that the network perimeter is anything but static, some may wonder if the firewall is still relevant for protecting today’s enterprise. The answer is yes, now more than ever.
Are you ready to place a call for simplified cybersecurity? It’s time to stop switchboarding.
Following convoluted, manual, and outdated workflows exposes your business to the risk of threats and human error. Does your team need to maintain the bridges like the human switchboard operators constantly connecting technologies, people, and processes? Find out how automating critical security workflows helps you save time and effort with smarter security.
Why Endpoint Security Matters in Protecting Remote Workers – Part 2
Securing your workforce endpoints is more important than ever before. Cisco AMP for Endpoints plays a critical role in the Cisco Secure Remote Worker solution, connecting and protecting people and devices remotely.
The million-dollar question: Is Cisco SecureX the same as XDR?
XDR is the new buzzword in cybersecurity. Learn why SecureX can do more to simplify your security experience.
Threat Landscape Trends: Endpoint Security, Part 1
In our new blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact defending your assets, especially if dealing with limited security resources.
Threat Roundup for September 11 to September 18
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 11 and September 18. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Detect even the sneakiest insider threats with Cisco Stealthwatch
Insider threats are difficult to detect and can be devastating for your business. Detect and stop insider threats dead in their tracks with Cisco Stealthwatch.
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security