- Our Favorite Topics:
2021 Security Outcomes Study: Timely Incident Response as a Business Enabler
4 min read
Incident response is more than putting out fires—it’s about handling unexpected events with minimal impact. In fact, Cisco’s Security Outcomes Study found timely IR among the top business enablers.
What are you missing when you don’t enable global threat alerts?
3 min read
Network telemetry can identify user behaviors, malicious tools installed in enterprise environments, and malware itself. Are you applying a global view to your network? If not, read on to learn more.
Threat Trends: DNS Security, Part 2
6 min read
A deep dive into industry-specific threat trends surrounding malicious DNS activity.
Straight from the source: 3 ways customers are improving security with Secure Network Analytics
4 min read
Surveyed Secure Network Analytics customers experienced radically improved network visibility, drastically reduced threat detection and response times, and significant operational efficiency gains after deploying the solution. Read the blog learn more!
Threat Roundup for March 12 to March 19
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 12 and March 19. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Accurate and Reliable Threat Detection for your Security Program
4 min read
The 2021 Security Outcomes Study shares the importance of accurate threat detection in cybersecurity efforts. How do you tailor your program to ensure accuracy and reliability?
Introducing The Cisco Telemetry Broker
2 min read
Introducing, The Cisco Telemetry Broker! Learn how you can optimize the consumption of telemetry data for your business-critical tools by brokering, filtering, and transforming your data.
MITRE ATT&CK: The Magic of Application Mitigations
5 min read
This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.
Future Focused: Encryption and Visibility Can Co-Exist
3 min read
Privacy and security are in constant tension. Hiding internet activity strengthens privacy—but also makes it easier for bad actors to infiltrate the network.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services