Securing Any Device—For the Exceptional Connected Experience
Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex […]
Cisco Live London 2013: IPv6 Security Lab Recap
This post summarizes, on behalf of the instructors of the course, the experiences of delivering the IPv6 Security Lab session recently at Cisco Live London 2013.
New White Paper: Testing the Efficacy of Cisco IPS
We have now followed up the performance work with a paper describing how we test the effectiveness of our IPS product line. This new paper titled, “Testing the Efficacy of Cisco IPS”, explains how Cisco IPS fits into the Cisco Security portfolio and how the IPS product team measures efficacy.
Collecting IT Security Intelligence Globally, Using it Locally
“Think globally, act locally” is a phrase, now cliché, because it expresses an incontrovertible and immediately graspable truth. The global-local concept applies when it comes to mobilizing globally-collected cyber threat data, which in turn informs local IT operations against hackers and criminals. Of note, data collections spanning the globe don’t appear magically out of the […]
Cisco Security Masters Dojo Course at CanSecWest 2013
My colleague, Joe Karpenko, and I will be presenting the Network Threat Defense, Countermeasures, and Controls Security Masters Dojo training course at the CanSecWest 2013 Applied Security Conference.
RSA Conference: T-Minus 30 Days and Counting
A month from now, thousands of cyber security friends, colleagues, professionals, hackers, defenders, sellers, buyers, old timers, and newbies will descend on San Francisco for the 2013 RSA Conference. We will challenge one another about what has changed, create new topics and new words to describe the previously indefinable, scare the heck out of each […]
Streamline Your Data Center with Three Key Optimized Security Measures
We’ve just authored a white paper on three must-have security measures that focuses on pivotal tactics and controls required for safe data center innovation. We’ve focused on controls that will enable security to be adaptive and responsive, enable users to securely access applications they need, and secure boundaries while demarcating between physical, virtual and cloud services. The goal of this white paper is to highlight three simple measures needed to take full advantage of security as a programmable element of the data center fabric. These measures leverage a design architecture that Cisco uniquely provides and that allows security to be easily built in at the design phase rather than being bolted on post implementation.
Acquisition of Cognitive Security Bolsters Cisco’s Cyber Threat Defense Capabilities
As part of our investment to strengthen the network with more analytics and intelligence to target today’s complex and disruptive threats, Cisco has announced the intent to acquire Cognitive Security, a privately held company headquartered in Prague, Czech Republic. Cognitive provides security software that is focused on applying artificial intelligence techniques to detect advanced cyber threats.
Happy New Exploit Kits! (I mean Happy Belated New Year!)
This article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco Cloud Web Security, particularly in conjunction with Cisco ASAs, to reduce the risk of your networks and users falling victim to these exploit kits.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security