A recipe for industrial security: A dash of IT, a pinch of OT, and a sprinkle of SOC
I like to cook. And if you enjoy it, too, you know that sharing the kitchen can bring a set of challenges. The more cooks there are in the kitchen, the more things can become contentious. But, if one person works on an appetizer, another on the main course, and a third on dessert, the […]
The four-step journey to securing the industrial network
Just as the digitization and increasing connectivity of business processes has enlarged the attack surface of the IT environment, so too has the digitization and increasing connectivity of industrial processes broadened the attack surface for industrial control networks. Though they share this security risk profile, the operational technology (OT) environment is very different from that […]
S4x20: The future of IIoT cybersecurity is here
At this year's S4 conference, Vikas Butaney will explore the intersection of security, data governance, and control as vendors seek to leverage your data and offer more cloud-based services. Come hear about the role that Cisco IoT solutions play in our IIoT cybersecurity strategy.
IIoT security tips and trends for 2020
It’s an exciting time to be in the industrial IoT security space. Having recently joined Cisco’s IoT security business unit as product manager for Cyber Vision, I’ve enjoyed seeing how the industry has evolved in just the past couple years. Current trends point clearly to opportunities for robust IIoT deployments. Market consolidation The acquisition of […]
Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award
We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about...
From Beginning to Endpoint: Covering All the Angles
No single technology will provide comprehensive protection to any threat landscape. Without the control to detect, block, and remediate an attack, you’re at a disadvantage when protecting your organization.
Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
In Pursuit of Invisibility: Fileless Malware
A recent survey asked whether people would prefer to the ability to fly or to be invisible. Silly question, but why they chose what they did provided unique insights.