Articles
A recipe for industrial security: A dash of IT, a pinch of OT, and a sprinkle of SOC
4 min read
Find out the key “ingredients” for the perfect industrial security “recipe.”
The four-step journey to securing the industrial network
2 min read
IT and OT environments are very different. This post looks at the key differences and provides a four-step approach to securing the industrial network.
S4x20: The future of IIoT cybersecurity is here
2 min read
Get a first look at Cisco’s presence at the S4x20 event in Miami.
IIoT security tips and trends for 2020
3 min read
Take a look at what we think are going to be the key trends of industrial IoT security as we head into 2020.
Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award
3 min read
We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about...
From Beginning to Endpoint: Covering All the Angles
2 min read
No single technology will provide comprehensive protection to any threat landscape. Without the control to detect, block, and remediate an attack, you’re at a disadvantage when protecting your organization.
Going with what works: The state of phishing
3 min read
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
In Pursuit of Invisibility: Fileless Malware
3 min read
A recent survey asked whether people would prefer to the ability to fly or to be invisible. Silly question, but why they chose what they did provided unique insights.
Machine Learning: Beyond the buzzword
2 min read
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the...
- 1
- 2