Security

October 28, 2019

SECURITY

Privacy is a Shared Responsibility

Practical tips on what both companies and consumers can and should do to keep personally identifiable information private.

October 22, 2019

SECURITY

Hit the Simple Button to Solve Complex Security Problems

This blog speaks about the power of the Cisco Security Analytics and Logging solution, which provides automated breach detection and visibility, combining telemetry from both perimeter and internal network sources.

October 22, 2019

SECURITY

How much security do you really need?

According to our new report, "The Security Bottom Line," no matter how large your budget is, you're not likely to feel that you have everything needed to secure your environment.

October 21, 2019

SECURITY

5 Key Takeaways from 2019 Stealthwatch Customer Research

Our customers drive what we do in security and we must make concerted efforts to keep up with their needs. In a survey that was sent out to over 10,000...

October 11, 2019

SECURITY

Putting the ‘C’ in Gartner’s CARTA

Trust is neither binary nor permanent: you don’t trust something or someone to do everything, and you don’t trust forever.

October 10, 2019

SECURITY

Cisco Advances Communications Security with Completion of Automated Cryptographic Validation Protocol Testing

We assume our communications are secure.  But are they?  Cryptography provides the foundation of secure communications, but how to know if that cryptography is correct and secure?

October 7, 2019

SECURITY

Bringing Cybersecurity Home

Cyberattacks know no boundaries between work and home, so we need to be diligent about cyber hygiene across environments. Learn tips to protect and secure your digital footprint.

October 4, 2019

SECURITY

Using CESA to Solve Endpoint Blindness for a World Class InfoSec Team

Cisco Endpoint Security Analytics (CESA) Built on Splunk brings together the endpoint behavioral visibility of Cisco’s AnyConnect Network Visibility Module (NVM) and the data transformation power of Splunk analytics.

October 3, 2019

SECURITY

Threat Hunting: How to Gain the Most Value

As security practitioners who continuously look for adversarial malice, one of the questions we are asked frequently is: What’s around the corner?