Security

Prev / Page 88

May 29, 2020

SECURITY

People Are The Strongest Link

2 min read

Our special guest on the Security Stories podcast this week is Brian Honan, the founder and CEO of IRISS; Ireland's first Computer Emergency Response Team. Our chat includes talking about managing a remote based security team, and why the cybersecurity industry needs more accountability.

May 29, 2020

SECURITY

3 reasons why Cisco Stealthwatch is the Michael Jordan of Network Traffic Analysis tools

3 min read

Michael Jordan did it all on the court, was a more complete player in his later years, and stopped everything on defense. Learn why Stealthwatch is no different and is a top Network Traffic Analysis (NTA) tool.

May 28, 2020

SECURITY

Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta

1 min read

Executive summary Static reverse-engineering in IDA can often be problematic. Certain values are calculated at run time, which makes it difficult to understand what a certain basic block is doing. If you try to perform dynamic analysis by debugging a piece of malware, the malware will often detect it and start behaving differently. Today, Cisco […]

May 28, 2020

SECURITY

The Benefits, and Potential Challenges of, Cloud Email Platforms

3 min read

Using cloud email platforms offers numerous opportunities for simplification and efficiency. It also comes with its own set of challenges.

May 28, 2020

SECURITY

The New Era of Business Continuity – What does it mean today?

4 min read

The term ‘business continuity’ has taken on a whole new meaning. It now extends beyond keeping the business running to helping your employees remain productive and secure wherever they go.

May 28, 2020

SECURITY

Cisco is Building a Bridge to Secure Access Service Edge

4 min read

SASE is a vision of a future secure networking model enterprises can use to adopt secure cloud computing. Cisco has been building a bridge to SASE for several years with SD-WAN and cloud security technologies.

May 28, 2020

SECURITY

Remote work and the threat landscape

4 min read

This month, we decided to take a look at some of the trends we’ve seen in a shifting threat landscape, including attackers who are adapting their techniques to take advantage of new opportunities. When you understand what they’re doing, it’s easier to mount a better defense against new trends in the threat landscape. 

May 27, 2020

SECURITY

Automated Threat Remediation in AWS with Stealthwatch Cloud

2 min read

Stealthwatch Cloud customers often ask for remediation capabilities in the public cloud when threats are exposed. Find out how you can automatically remediate threats in AWS using Cisco Stealthwatch Cloud.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services