Security

Prev / Page 220

September 29, 2016

SECURITY

Using Cisco Umbrella with Cisco WSA and Splunk for private reporting

2 min read

Sometimes having a effective and innovative solution goes in a confrontation with the local country requirements. Especially when we want to deploy as cloud based security service. Using a cloud security service will one the one hand address quite nicely the need for better security and easy deployment , on the other hand a CxO […]

September 29, 2016

SECURITY

Going back to school on IoT security – personal reflections from a cybersecurity product marketeer

3 min read

Has anybody ever actively encouraged you to hack your own car?  Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How […]

September 28, 2016

SECURITY

September 2016 Cisco IOS & IOS XE Software Bundled Publication

1 min read

Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year).  Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]

September 27, 2016

SECURITY

Threat Spotlight: GozNym

1 min read

This blog was authored by Ben Baker, Edmund Brumaghin, and Jonah Samost. Executive Summary GozNym is the combination of features from two previously identified families of malware, Gozi and Nymaim. Gozi was a widely distributed banking trojan with a known Domain Generation Algorithm (DGA) and also contained the ability to install a Master Boot Record […]

September 26, 2016

SECURITY

2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%

1 min read

Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effective segmentation helps protect key assets and data while preventing the dangerous lateral movements of […]

September 21, 2016

SECURITY

The Rising Tides of Spam

1 min read

This blog post was authored by Jaeson Schultz. For the past five years we have enjoyed a relatively calm period with respect to spam volumes. Back at the turn of the decade the world was experiencing record-high volumes of spam. However, with the evolution of new anti-spam technologies, combined with some high-profile takedowns of spam-related […]

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

7 min read

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibility for network security monitoring. Some of the key findings include: Many organizations now […]

September 19, 2016

SECURITY

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

8 min read

This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...

September 14, 2016

SECURITY

Why Cisco Is an Essential Partner in Cyber Ops: PART 2

2 min read

Once an organization has deployed technology infrastructure that enables visibility into the network (discussed in the first part of this blog), that organization now requires the properly trained security personnel to bring that time to detection (TTD) down to acceptable levels and to respond appropriately to a security breach. Once detected, a breach must be […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services