Cloudy with a Chance of Extremely High Alert Accuracy
Analytics are becoming increasingly critical for security, and when done right, can significantly improve an organization’s risk posture. Learn how Cisco Stealthwatch can bolster your defenses.
From Privacy to Trust and ROI
The latest Cisco Data Privacy Benchmark Study provides groundbreaking research and insights on keeping data safe, earning customer trust and maximizing investments in data privacy.
Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
Tour the RSA Conference 2020 Security Operations Center
Register now for your free tour of the RSA Conference Security Operations Center (SOC), where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored by RSA and Cisco. Sign up for a guided tour, where we’ll show real time traffic in NetWitness Packets, plus advanced malware analysis, […]
Datacenter Security: How to Balance Business Agility with Great Protection
With rise of applications, datacenters are rapidly evolving and so are the security threats. IDC shares the approach to securing data center and how Cisco closely aligns with it.
An Overview of Zero Trust Architecture, According to NIST
NIST recently released a draft publication, Zero Trust Architecture (ZTA), an overview of a new approach to network security. Get an overview of the key tenets, threats, and how to get visibility and continuous monitoring in a zero trust architecture.
Relentless Breach Defense Endpoint Protection Platform + Endpoint Detection and Response
Defending against breaches today requires modern defenses, and technology that simplifies your security operations. That’s why we’ve brought Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) capabilities together in a single cloud-delivered solution called Cisco® Advanced Malware Protection (AMP) for Endpoints. It is relentless at stopping breaches and blocking malware, then rapidly detects, contains, and remediates advanced threats that evade front-line defenses.
The 3 W’s in Zero Trust Security
“Always check, never trust” – learn why moving from a perimeter model to zero trust security can help protect your workforce, workload and workplace.
Anomaly Detection in Complex Systems: Zero Trust for the Workplace
Zero trust and complexity management represent a new basic combination for a closed-loop approach to anomaly detection and mitigation for critical infrastructures.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security