Driving Efficiency and Productivity with Cisco Defense Orchestrator
Users of Cisco Defense Orchestrator shared their experiences with the product on IT Central Station noting it makes their teams more productive, particularly when managing policies across Cisco ASA, FTD, and Meraki MX devices.
The Advantages of Next-Generation Firewalls (NGFWs)
Read what other IT professionals are saying about Cisco ASA and Firepower NGFW devices enabling greater visibility into the network and applications while improving threat mitigation.
Fighting Cybercrime and Creating Jobs for Latin America
Our increasingly digital world is at risk to cyberattacks. Governments can’t fight cybercrime alone. We need more cybersecurity experts. Latin America is especially vulnerable. What can be done?
Configuring Cisco Security with Amazon VPC Ingress Routing
Amazon Web Services (AWS) announced a new capability in Virtual Private Cloud (VPC) networking that is designed to make it easier and more efficient for Cisco Security customers to deploy advanced security controls in the cloud.
A New Day for Critical Infrastructure Security & Resilience
It’s a new Day for National Critical Infrastructure Security and Resilience. While November is recognized as the month focused on this issue in the U.S., for some time, digital transformation has widened the aperture of our lens dramatically.
Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it may appear as though the ads that are displayed are just a component of the site […]
Why We Must Get Data Privacy Right
Privacy regulations are having a positive effect on business and are enhancing consumer trust. See just published Cisco Blog by Robert Waitman and the Cisco 2019 Consumer Privacy Survey.
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure the connected devices are acting as intended?
Finding the malicious needles in your endpoint haystacks
Cisco’s new EDR capabilities perform complex queries across all endpoints for forensic information and malware artifacts to simplify and accelerate threat hunting, incident investigations, remediation, and vulnerability and compliance assessments.