Security

January 16, 2020

SECURITY

Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!

Cisco Stealthwatch provides comprehensive network-wide visibility and security analytics, so you can stay ahead of attackers and expose their locations and behaviors to help you prevent a security event from becoming a full-blown breach. Today, we’re happy to announce that you’ll have the chance to get behind the wheel and give Stealthwatch a live test drive!

January 15, 2020

SECURITY

Disk Image Deception

Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.

January 13, 2020

SECURITY

Tour the RSA Conference 2020 Security Operations Center

Register now for your free tour of the RSA Conference Security Operations Center (SOC), where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored by RSA and Cisco. Sign up for a guided tour, where we’ll show real time traffic in NetWitness Packets, plus advanced malware analysis, […]

January 7, 2020

SECURITY

An Overview of Zero Trust Architecture, According to NIST

NIST recently released a draft publication, Zero Trust Architecture (ZTA), an overview of a new approach to network security. Get an overview of the key tenets, threats, and how to get visibility and continuous monitoring in a zero trust architecture.

December 20, 2019

SECURITY

The 3 W’s in Zero Trust Security

“Always check, never trust” – learn why moving from a perimeter model to zero trust security can help protect your workforce, workload and workplace.

December 19, 2019

SECURITY

Anomaly Detection in Complex Systems: Zero Trust for the Workplace

Zero trust and complexity management represent a new basic combination for a closed-loop approach to anomaly detection and mitigation for critical infrastructures.

December 18, 2019

SECURITY

Stealthwatch Enterprise and Cisco Threat Response: Bringing machine-scale analysis to human-scale understanding

Want deep network analysis, to quickly understand the behavior of the threats you face? Read the blog to understand how Cisco Stealthwatch Enterprise integration with Threat Response brings advanced security analytics and accelerates key security operations functions: detection, investigation, and remediation in your SOC.

December 18, 2019

SECURITY

Combat Modern Day Plague in Security with Email Security and Cisco Threat Response Integration

Learn how Cisco Threat Response automates integration across your security products, including Email Security to provide a seamless experience that serves as a foundation for fast, efficient incident investigation and response. Get contextual awareness and correlation with expanded insights needed to protect users from threats in the incoming emails.

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security