Security

May 15, 2020

SECURITY

Tetration and AWS = Win-Win for Cloud and Workload Protection

Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.

May 14, 2020

SECURITY

Cisco Threat Response takes the leap with SecureX

Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps, and ITOps.

April 28, 2020

SECURITY

Firewalling and VPN in the Remote-Work Era

The government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever.

May 13, 2020

SECURITY

“The security industry doesn’t have to be this way”. Talking people powered security with Masha Sedova

This Security Stories podcast episode features security entrepreneur Masha Sedova. We discuss how to create security awareness training that has lasting impact, the challenges Masha faced when she set her business up, and why diversity matters in her workforce

May 13, 2020

SECURITY

Getting more value from your endpoint security tool #2: Querying Tips for threat hunting

Cisco Orbital Advanced Search has an entire section of its Catalog dedicated to Threat Hunting, mapped to the MITRE ATT&CK™ framework, allowing you to query your endpoints for malicious artifacts.

May 12, 2020

SECURITY

The KonMari Method: Sparking Joy with a Tidy Security Closet

With so many technologies cluttering your cybersecurity closet, how can you best strengthen your security? Can you get rid of complexity without compromising security? What if, we said yes...find out how SecureX can aid in your cybersecurity tidying!

May 11, 2020

SECURITY

Threat Spotlight: Astaroth – Maze of Obfuscation and Evasion Reveals Dark Stealer

By Nick Biasini, Edmund Brumaghin and Nick Lister. Executive summary The threat landscape is littered with various malware families being delivered in a constant wave to enterprises and individuals alike. The majority of these threats have one thing in common: money. Many of these threats generate revenue for financially motivated adversaries by granting access to […]

May 8, 2020

SECURITY

Threat Roundup for May 1 to May 8

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

May 8, 2020

SECURITY

3 ways to put the expanding perimeter on ISE and gain zero-trust

Read 3 ways ISE is taking on the expanding network perimeter and bringing zero trust into the workplace to solve secure access challenges.

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security