War Games: A WOPR of a Security Test (Part 4)
These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.
NIAS 2018 Highlights
NATO NIAS was an excellent conference for NATO, Cisco, and all attendees. I eagerly anticipate another excellent conference at NIAS 2019!
Protecting Critical Infrastructure Networks with Zero Trust Segmentation
Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked operational technology. Further, critical infrastructure is often managed and deployed over connected systems supported...
A Required Cloud Native Security Mindset Shift
There has been a significant shift in the public cloud infrastructure offerings landscape in the last 3-5 years. With that shift we as Information Security practitioners must also fundamentally shift...
Endpoint Security – The Daunting Challenges of the Holiday Season
Turkey, Family, Gifts, Cookies, and…Malware? Wait, what? Make sure your Endpoint Security is up to the task during this holiday season!
The Role of a Coach
This time of year, all five major sports leagues are “in season”. The raw emotion of competition and witnessing these finely tuned professional athletes overcome adversity to be the best...
Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
Five Questions to Ask About Your Data Privacy in the EU
The new EU data warehouse for Cisco Umbrella log storage promises to make your life a little less complicated and enhance your data privacy.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security