Cracking the Code – How to Measure the Real Value of Information Security Management
To help measure the success and value of information security organizations, Cisco has developed a process to capture and quantify losses from security incidents, comparing them against established industry benchmarks.
The Role of Visibility in SecOps
The bad guys aren’t going away. The good news is Next Generation Firewalls, Malware Protection, and Access Control are not only improving, but in some cases, working in concert together.
Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster
Cisco Stealthwatch Cloud provides an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. Here's how easy it is to deploy into an existing K8s cluster.
Know When to Have a Dedicated NGIPS vs. NGFW
The distinction between use case scenarios for standalone NGIPS vs. NGFW deployments can often be tricky to navigate.
New Study Shows Correlating Network and Endpoint Data is Highly Manual
We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint....
Cognitive Intelligence: Empowering Security Analysts, Defeating Polymorphic Malware
In psychology, the term “cognition” refers to a human function that is involved in gaining knowledge and intelligence. It helps describe how people process information and how the treatment...
Jamf Pro now integrated with Cisco Security Connector
Cisco Security Connector is now integrated with Jamf Pro (formerly known as the Casper Suite), a leading Enterprise Mobility Management (EMM) tool.
Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States
SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.
Why Organizations With Sensitive Research or Intellectual Property Need a Zero Trust Cybersecurity Framework Approach
With Zero Trust moving you away from the perimeter security approach towards a framework protecting sensitive data, it opens up a number of situations...