Articles
Staying Ahead of ‘Andromeda-Style’ Threats in Your Environment
Why rapid attack containment and a short remediation cycle matter When a new threat gets in the environment, a security incident could unfold very quickly. Detecting the compromise and...
Cisco Stealthwatch detects threats across private networks, public clouds, and encrypted traffic
You have a bigger, more open, and diverse network than ever before. Whether you want to go all-in on cloud, spread your infrastructure across multiple public clouds, embrace containers and...
Extend Your Security to the Cloud with Confidence
Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]
Cisco Defense Orchestrator: The Security Policy Management “Easy Button”
Staying on top of security is hard, especially for network operations staff. If you’re like most of your peers, you probably have lots of devices, tons of policies and many locations and even cloud deployments to account for. Every time you need to change a policy, the complexity and time involved to do it right is […]
Don’t Let Your Cloud Security Strategy Get Railroaded by Old Thinking
The standard gauge used for railroads (that is the distance between the rails) in the U.S. is four feet, eight and a half inches, which is an odd number however you look at it. The history behind it is even stranger and is a cautionary tale of assumptions and the consequences of basing decisions on […]