Cisco IoT Threat Defense Debuts at Cisco Live
I’m psyched! Today we’re launching IoT Threat Defense, and it’s the most comprehensive security solution yet for the Internet of Things. And it couldn’t come a moment too soon. Let’s be frank. IoT devices, on the whole, aren’t capable of defending themselves from cyber-attacks. That means they can provide a means of access to their […]
Cisco Extends Security Openness with McAfee Interoperability and New Technology Partners
Vendor “openness” drives better outcomes for the state of information security. That’s why Cisco has invested and committed so heavily to our Cisco Security Technical Alliances (CSTA) program in recent years. CSTA now has over 130 technology partners…a six-fold increase from where we started nearly four years ago. It is a use-case driven technology partner […]
Apple and Cisco: Partnering to Deliver the Deepest Visibility and Security Control for a Mobile Workforce
Apple and Cisco have partnered to create the best experience for iPhone and iPad on corporate networks. Now, the Cisco Security Connector will deliver visibility, control, and privacy for iOS.
Securing Your Data in the Transformation to Digital
I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Haynes, Cisco product specialist at Global Knowledge Canada, here are my top three […]
Threat Round-up for June 16 – June 23
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 16 and June 23. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
A Steady Drumbeat for Simple, Open and Automated
I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]
Detecting Encrypted Malware Traffic (Without Decryption)
Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.
Vulnerability Spotlight: Multiple Vulnerabilities in InsideSecure MatrixSSL
These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Overview MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features […]
What is the Body Language of Your Encrypted Network Traffic Really Saying?
The rise of encrypted traffic is changing the threat landscape; the increase in digital business has increased the number of services using encrypted traffic to secure information.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security