Security

Prev / Page 168

March 13, 2018

SECURITY

Microsoft Patch Tuesday – March 2018

1 min read

Today, Microsoft released its monthly set of security advisories, addressing 74 new vulnerabilities, with 14 of them rated critical and 59 of them rated important.

March 13, 2018

SECURITY

DevSecOps: Automation for Assurance

3 min read

This is Part 3 in our Four Part DevSecOps Blog Series In Part 2 of this blog series, DevSecOps - Security at the Speed of Business, we explained the...

March 12, 2018

SECURITY

New #CiscoChat Podcast: Threat Correlation Across Endpoint, Network, & Cloud

1 min read

What is AMP Unity? Simply put, it’s a collection of all aspects of AMP, across your network, under a single roof in the cloud AMP Console.

March 9, 2018

SECURITY

Using machine learning to detect possible insider threats

2 min read

Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the cloud.

March 8, 2018

SECURITY

Balancing Cybersecurity Program Priorities: It’s Time to Get Help

3 min read

The Project Management Triangle. The Iron Triangle.  The Triple Constraint. There are many names for the three-word phrases in the title of this blog, but it all comes down to...

March 6, 2018

SECURITY

Securing Hybrid Cloud Workloads with the Expanded Cisco Tetration Platform

2 min read

Take a proactive approach to your security strategy through your data center - the prime target of cybercriminals.

March 6, 2018

SECURITY

Gozi ISFB Remains Active in 2018, Leverages “Dark Cloud” Botnet For Distribution

1 min read

Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a widely distributed type of...

March 5, 2018

SECURITY

Don’t Let Malware Slip Through Your Fingers

9 min read

Detecting and stopping malware is a difficult problem to solve. As the methods of detection and prevention become more advanced so too do the techniques used by malware authors.

March 2, 2018

SECURITY

Cisco Threat Grid Supports FLETC’s New Cyber Incident Response and Analysis Course

3 min read

Three years ago, Cisco leadership approved my creation of the Threat Grid for Law Enforcement (TG4LE) program, where we equip state and local law enforcement investigators with a no-cost Threat Grid account.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services