Security

October 28, 2014

SECURITY

File Security With the Click of a Button

Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, file exchange has […]

October 27, 2014

SECURITY

Can the Elephant Dance to a Security Tune?

There is a great debate in the security world right now: have SIEM and logging products run their course? Will Hadoop ride to the rescue? Can machines “learn” about security and reliably spot threats that no other approach can find? Gartner calls this phenomenon Big Data Security Analytics, and they make a strong point to […]

October 22, 2014

SECURITY

Endpoint Visibility is Key to Combatting Attacks

As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used in the workplace are expanding, which […]

October 16, 2014

SECURITY

New Security White Paper: Unified Computing System (UCS) Hardening Guide

Check out the new Cisco UCS Hardening Guide white paper which is now released  and available on the Cisco Security Portal. The paper outlines and highlights security best practices for Cisco UCS. This paper provides information to help users secure Cisco Unified Computing System (Cisco UCS) platform and provides guidance on how to harden Cisco […]

October 15, 2014

SECURITY

Announcing the IoT Security Grand Challenge Winners

The Internet of Things (IoT) is exponentially increasing the number and type of attack vectors, creating many new cybersecurity challenges for organizations and those responsible for defending the infrastructure. These new threats to data and physical security are a top concern for organizations as they seek ways to gain greater operational efficiencies and power new […]

October 15, 2014

SECURITY

Naughty Users! Protect Your Endpoints From Users’ Bad Behavior

Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to focus on what we can do to defend directly […]

October 14, 2014

SECURITY

Gartner’s perspective on Cisco TrustSec

I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and informative viewpoint. To read Gartner’s perspective on TrustSec […]

October 8, 2014

SECURITY

Security and the Internet of Everything

The theme of this year's Cyber Security Awareness Month is "Our Shared Responsibility." At Cisco, security is everyone's responsibility – from our trustworthy development processes, to innovation enabling our...

October 7, 2014

SECURITY

To Succeed with Big Data, Enterprises Must Drop an IT-Centric Mindset; Securing IoT Networks Requires New Thinking

To help organizations who aspire to apply the power of big data enterprise-wide, Cisco provides a powerful, efficient, and secure infrastructure and a wide array of analytics solutions. In our previous blogs, others have highlighted the benefits of Cisco’s ability to provide the scalability, ability to process both real-time data and historical data with predictable, […]

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security