Articles
A recipe for industrial security: A dash of IT, a pinch of OT, and a sprinkle of SOC
Find out the key “ingredients” for the perfect industrial security “recipe.”
The four-step journey to securing the industrial network
IT and OT environments are very different. This post looks at the key differences and provides a four-step approach to securing the industrial network.
S4x20: The future of IIoT cybersecurity is here
Get a first look at Cisco’s presence at the S4x20 event in Miami.
IIoT security tips and trends for 2020
Take a look at what we think are going to be the key trends of industrial IoT security as we head into 2020.
Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award
We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about...
From Beginning to Endpoint: Covering All the Angles
No single technology will provide comprehensive protection to any threat landscape. Without the control to detect, block, and remediate an attack, you’re at a disadvantage when protecting your organization.
Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
In Pursuit of Invisibility: Fileless Malware
A recent survey asked whether people would prefer to the ability to fly or to be invisible. Silly question, but why they chose what they did provided unique insights.
Machine Learning: Beyond the buzzword
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the...
- 1
- 2