Cyber Security Awareness Month 2013: Trust is the Topic
Read, listen, and watch as John Stewart, Senior Vice President and Chief Security Officer at Cisco, espouses the benefits of trustworthy systems and the need for our vendors to hold us accountable for insuring our products meet the requirements of trustworthy systems.
Making Boring Logs Interesting
This post centers around the practice of logging data - data from applications, devices, and networks - and how the components of data logging can help in the identification and remediation of network events.
Wireless Security Yesterday, Today and Tomorrow
As we continue our series of blog posts during National Cyber Security Awareness Month (NCSAM), we focus today on some best common practices that can be used both at home and in the workplace to enhance the overall security posture of your Wireless Networks.
SUMMARY – Martin Roesch on Sourcefire Becoming Part of Cisco
Cisco Security has announced the closing of the acquisition of Sourcefire. Sourcefire founder and CTO (and creator of Snort®) Martin Roesch posted to Sourcefire's blog this morning to share the news:
SUMMARY Chris Young: Cisco Closes Sourcefire Acquisition; Delivers Threat-Centric Security Model
Chris Young, SVP of Cisco’s Security Business Group, posted an official announcement this morning on Cisco’s The Platform blog heralding the close of the Sourcefire acquisition. “I am excited to announce that Cisco has completed the acquisition of Sourcefire. With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model”, said Young. Read the full post with all the exciting details here: http://blogs.cisco.com/news/cisco-closes-sourcefire-acquisition-delivers-threat-centric-security-model
Big Security—Mining Mountains of Log Data to Find Bad Stuff
Your network, servers, and a horde of laptops have been hacked. You might suspect it, or you might think it’s not possible, but it’s happened already. What’s your next move? The dilemma of the “next move” is that you can only discover an attack either as it’s happening, or after it’s already happened. In most […]
Ten Simple Ways to Enhance Cyber Security for You and Others
Hi there and welcome to today's U.S. National Cyber Security Awareness Month tip, courtesy of those of us involved in administering and/or contributing to Cisco Security Intelligence Operations!! For...
Using DNS RPZ to Block Malicious DNS Requests
After delivering several presentations at Cisco Live and Cisco Connect this year, I received a few questions regarding DNS Response Policy Zones (RPZ) and how can they be used to block DNS resolution to known malicious hosts and sites. I decided to write this short post to explain what it is and provide several pointers. […]
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security