Security

October 10, 2013

SECURITY

Cyber Security Awareness Month 2013: Trust is the Topic

Read, listen, and watch as John Stewart, Senior Vice President and Chief Security Officer at Cisco, espouses the benefits of trustworthy systems and the need for our vendors to hold us accountable for insuring our products meet the requirements of trustworthy systems.

October 9, 2013

SECURITY

Making Boring Logs Interesting

This post centers around the practice of logging data - data from applications, devices, and networks - and how the components of data logging can help in the identification and remediation of network events.

October 8, 2013

SECURITY

Wireless Security Yesterday, Today and Tomorrow

As we continue our series of blog posts during National Cyber Security Awareness Month (NCSAM), we focus today on some best common practices that can be used both at home and in the workplace to enhance the overall security posture of your Wireless Networks.

October 8, 2013

SECURITY

SUMMARY – Martin Roesch on Sourcefire Becoming Part of Cisco

Cisco Security has announced the closing of the acquisition of Sourcefire. Sourcefire founder and CTO (and creator of Snort®) Martin Roesch posted to Sourcefire's blog this morning to share the news:

October 8, 2013

SECURITY

SUMMARY Chris Young: Cisco Closes Sourcefire Acquisition; Delivers Threat-Centric Security Model

Chris Young, SVP of Cisco’s Security Business Group, posted an official announcement this morning on Cisco’s The Platform blog heralding the close of the Sourcefire acquisition. “I am excited to announce that Cisco has completed the acquisition of Sourcefire. With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model”, said Young. Read the full post with all the exciting details here: http://blogs.cisco.com/news/cisco-closes-sourcefire-acquisition-delivers-threat-centric-security-model

October 7, 2013

SECURITY

Razzle Dazzle v2.0

During World War I, British artist and navy officer Norman Wilkinson proposed the use of "Dazzle Camouflage" on ships. The concept behind Dazzle Camouflage, as Wilkinson explained, was to “paint...

October 3, 2013

SECURITY

Big Security—Mining Mountains of Log Data to Find Bad Stuff

Your network, servers, and a horde of laptops have been hacked. You might suspect it, or you might think it’s not possible, but it’s happened already. What’s your next move? The dilemma of the “next move” is that you can only discover an attack either as it’s happening, or after it’s already happened. In most […]

October 3, 2013

SECURITY

Ten Simple Ways to Enhance Cyber Security for You and Others

Hi there and welcome to today's U.S. National Cyber Security Awareness Month tip, courtesy of those of us involved in administering and/or contributing to Cisco Security Intelligence Operations!! For...

October 2, 2013

SECURITY

Using DNS RPZ to Block Malicious DNS Requests

After delivering several presentations at Cisco Live and Cisco Connect this year, I received a few questions regarding DNS Response Policy Zones (RPZ) and how can they be used to block DNS resolution to known malicious hosts and sites. I decided to write this short post to explain what it is and provide several pointers. […]

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security