Articles
The Firewall: The foundation for a robust Security Platform
4 min read
Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes...
Is Network Security Complexity Holding You Back?
2 min read
It’s not just your imagination. Security is getting more complex. With organizations facing challenges like managing complexity and its consequences, looking to technology integration, automation, and simplification may pave the way for IT professionals to persevere.
#CiscoChat Podcast: Exploring Encrypted Traffic Analytics
1 min read
Recorded live from the Cisco Live Las Vegas floor, this episode focuses on security. More specifically, we look at recent developments in encryption and Cisco’s latest security solution, Encrypted Traffic Analytics.
Get Up to Speed on Security at Cisco Live US 2017
9 min read
Your guide to all things cybersecurity at Cisco Live
Security Sneak Peek at Cisco Live US 2016
3 min read
If you’re interested in cybersecurity (and really, who isn’t these days?), you have a lot to look forward to at Cisco Live US. Digital Business Transformation will be in the spotlight this year and our world-class experts will be sharing how security acts as a fundamental enabler of that transformation. We’re offering more than 200 […]
Nominations are Now Open for Cisco Champions for Security
1 min read
Are you passionate about security technology? Are you interested in connecting with a global network of people like you? If so, you could be a good candidate to join the all-new Cisco Champions for Security group. Cisco Champions are a group of individuals from around the world who enjoy connecting with each other and sharing […]
Visualizing a String of Paerls
1 min read
Researchers from the Cisco Talos Security Intelligence and Research Team recently discovered an elaborate attack dubbed the String of Paerls. The attack, a combined spearphishing and exploit attempt, was able to bypass most antivirus engines and used a targeted phishing email that included a malicious Word document attachment. Upon opening the Word attachment, a macro downloaded […]