Security

November 14, 2018

SECURITY

Celebrating the 100th Anniversary of Veterans Day Serving Those Who Served

This week marks the 100th Anniversary of Armistice Day and Veterans Day.  With veterans top of mind, Cisco today announced the expansion of CyberVetsUSA, a free cybersecurity training program...

November 14, 2018

SECURITY

Reinvent Branch Connectivity with Cisco SD-WAN Security

The proliferation of the cloud has allowed users to connect to applications and data from anywhere and from any device, which has been a net gain for businesses that have...

November 13, 2018

SECURITY

Security Innovations: Four Compelling New Reasons to Choose Cisco Security

Kaizen, a Japanese word for "improvement," is a term used in business to describe ongoing process improvement. Here we discuss four key tenets of Kaizen in modern cybersecurity.

November 11, 2018

SECURITY

Demystifying: Cryptocurrency Mining Threats

How to protect your endpoints from “creepy crypto miners” Here’s what’s creepy about cryptocurrency mining threats. It can lead to the slow death of your computers – capable of literally...

November 10, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 4)

These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.

November 8, 2018

SECURITY

NIAS 2018 Highlights

NATO NIAS was an excellent conference for NATO, Cisco, and all attendees. I eagerly anticipate another excellent conference at NIAS 2019!

November 7, 2018

SECURITY

Protecting Critical Infrastructure Networks with Zero Trust Segmentation

Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked  operational technology.  Further, critical infrastructure is often managed and deployed over connected systems supported...

November 6, 2018

SECURITY

A Required Cloud Native Security Mindset Shift

There has been a significant shift in the public cloud infrastructure offerings landscape in the last 3-5 years. With that shift we as Information Security practitioners must also fundamentally shift...