Security

Prev / Page 90

May 15, 2020

SECURITY

Tetration and AWS = Win-Win for Cloud and Workload Protection

2 min read

Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.

May 14, 2020

SECURITY

Cisco Threat Response takes the leap with SecureX

5 min read

Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps, and ITOps.

May 14, 2020

SECURITY

Firewalling and VPN in the Remote Work Era

3 min read

A misleading statement from one area of the information security industry falsely argues that the U.S. Government is “sounding the alarm around VPN security.” Actually, the government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever.

May 13, 2020

SECURITY

“The security industry doesn’t have to be this way”. Talking people powered security with Masha Sedova

2 min read

This Security Stories podcast episode features security entrepreneur Masha Sedova. We discuss how to create security awareness training that has lasting impact, the challenges Masha faced when she set her business up, and why diversity matters in her workforce

May 13, 2020

SECURITY

Getting more value from your endpoint security tool #2: Querying Tips for threat hunting

2 min read

Cisco Orbital Advanced Search has an entire section of its Catalog dedicated to Threat Hunting, mapped to the MITRE ATT&CK™ framework, allowing you to query your endpoints for malicious artifacts.

May 12, 2020

SECURITY

The KonMari Method: Sparking Joy with a Tidy Security Closet

4 min read

With so many technologies cluttering your cybersecurity closet, how can you best strengthen your security? Can you get rid of complexity without compromising security? What if, we said yes...find out how SecureX can aid in your cybersecurity tidying!

May 11, 2020

SECURITY

Threat Spotlight: Astaroth – Maze of Obfuscation and Evasion Reveals Dark Stealer

2 min read

By Nick Biasini, Edmund Brumaghin and Nick Lister. Executive summary The threat landscape is littered with various malware families being delivered in a constant wave to enterprises and individuals alike. The majority of these threats have one thing in common: money. Many of these threats generate revenue for financially motivated adversaries by granting access to […]

May 8, 2020

SECURITY

Threat Roundup for May 1 to May 8

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

May 8, 2020

SECURITY

3 ways to put the expanding perimeter on ISE and gain zero-trust

3 min read

Read 3 ways ISE is taking on the expanding network perimeter and bringing zero trust into the workplace to solve secure access challenges.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services