Security

May 21, 2020

SECURITY

Vulnerability Spotlight: Memory Corruption Vulnerability in GNU Glibc Leaves Smart Vehicles Open to Attack

By Sam Dytrych and Jason Royes. Executive summary Modern automobiles are complex machines, merging both mechanical and computer systems under one roof. As automobiles become more advanced, additional sensors and devices are added to help the vehicle understand its internal and external environments. These sensors provide drivers with real-time information, connect the vehicle to the […]

May 21, 2020

SECURITY

Your Network Has Left the Building – How do you secure it?

Today’s security teams have to mind various areas of their infrastructure, remote users and endpoints, and applications running everywhere in order to remain secure. How do you do it all?

May 21, 2020

SECURITY

The Future of the Email Security Market: The Importance of the Secure Email Gateway

Understanding the future of the email security market isn’t complete without a look at the importance of Secure Email Gateways and how they effectively protect cloud email platforms.

May 20, 2020

SECURITY

Go Agentless – Increase flexibility and prevent compromise from mobile devices in real time with ISE and Frontline.Clo …

Customers are ensuring mobile devices are safe, without agents and increasing flexibility while maintaining performance with Cisco and Frontline.Cloud

May 20, 2020

SECURITY

Announcing Cisco Tetration SaaS Offering Available in Europe

Tetration SaaS for workload security is now available in Europe. European enterprise, public sector or startup organizations now have a SaaS-based workload security solution, hosted in Europe. Take advantage of the security, scalability, and reliability of the Tetration SaaS platform to innovate and iterate faster; securely.

May 18, 2020

SECURITY

Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test

Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV Comparatives Business Main Test Series for 2020.

May 15, 2020

SECURITY

Tetration and AWS = Win-Win for Cloud and Workload Protection

Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.

May 14, 2020

SECURITY

Cisco Threat Response takes the leap with SecureX

Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps, and ITOps.

May 14, 2020

SECURITY

Firewalling and VPN in the Remote Work Era

A misleading statement from one area of the information security industry falsely argues that the U.S. Government is “sounding the alarm around VPN security.” Actually, the government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever.

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security