Vulnerability Spotlight: Memory Corruption Vulnerability in GNU Glibc Leaves Smart Vehicles Open to Attack
By Sam Dytrych and Jason Royes. Executive summary Modern automobiles are complex machines, merging both mechanical and computer systems under one roof. As automobiles become more advanced, additional sensors and devices are added to help the vehicle understand its internal and external environments. These sensors provide drivers with real-time information, connect the vehicle to the […]
Your Network Has Left the Building – How do you secure it?
Today’s security teams have to mind various areas of their infrastructure, remote users and endpoints, and applications running everywhere in order to remain secure. How do you do it all?
The Future of the Email Security Market: The Importance of the Secure Email Gateway
Understanding the future of the email security market isn’t complete without a look at the importance of Secure Email Gateways and how they effectively protect cloud email platforms.
Go Agentless – Increase flexibility and prevent compromise from mobile devices in real time with ISE and Frontline.Clo …
Customers are ensuring mobile devices are safe, without agents and increasing flexibility while maintaining performance with Cisco and Frontline.Cloud
Announcing Cisco Tetration SaaS Offering Available in Europe
Tetration SaaS for workload security is now available in Europe. European enterprise, public sector or startup organizations now have a SaaS-based workload security solution, hosted in Europe. Take advantage of the security, scalability, and reliability of the Tetration SaaS platform to innovate and iterate faster; securely.
Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test
Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV Comparatives Business Main Test Series for 2020.
Tetration and AWS = Win-Win for Cloud and Workload Protection
Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.
Cisco Threat Response takes the leap with SecureX
Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps, and ITOps.
Firewalling and VPN in the Remote Work Era
A misleading statement from one area of the information security industry falsely argues that the U.S. Government is “sounding the alarm around VPN security.” Actually, the government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security