Security

February 11, 2020

SECURITY

Do I really need additional email security when using Office 365?

Do I really need additional email security when using Office 365? One of the most common questions we get asked today, and the answer is that it depends. This blog will introduce how a customer should approach this decision, explain why it is so important to not make a tick box comparison and cover some of the areas that need to be considered.

January 31, 2020

SECURITY

Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!

Cisco Stealthwatch provides comprehensive network-wide visibility and security analytics, so you can stay ahead of attackers and expose their locations and behaviors to help you prevent a security event from becoming a full-blown breach. Today, we’re happy to announce that you’ll have the chance to get behind the wheel and give Stealthwatch a live test drive!

January 29, 2020

SECURITY

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the […]

January 28, 2020

SECURITY

Time for Some Straight Talk Around Network Traffic Analysis

Network Traffic Analysis (NTA) solutions have become necessary to stay ahead of threats in today’s attack landscape. Learn what makes Cisco Stealthwatch the leading NTA product.

January 27, 2020

SECURITY

Cloudy with a Chance of Extremely High Alert Accuracy

Analytics are becoming increasingly critical for security, and when done right, can significantly improve an organization’s risk posture. Learn how Cisco Stealthwatch can bolster your defenses.

January 27, 2020

SECURITY

From Privacy to Trust and ROI

The latest Cisco Data Privacy Benchmark Study provides groundbreaking research and insights on keeping data safe, earning customer trust and maximizing investments in data privacy.

January 15, 2020

SECURITY

Disk Image Deception

Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.

January 13, 2020

SECURITY

Tour the RSA Conference 2020 Security Operations Center

Register now for your free tour of the RSA Conference Security Operations Center (SOC), where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored by RSA and Cisco. Sign up for a guided tour, where we’ll show real time traffic in NetWitness Packets, plus advanced malware analysis, […]

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security