2017 cybersecurity report
Industrial security: Master your fear of the unknown
When it comes to scary movies, the most terrifying ones are often about the unknown. It’s easy to grasp a frightening ghost, monster, or some lunatic chasing after a group of folks whose van broke down in the wrong town. However, the unknown allows for another level of paranoia because you never know what’s coming […]
IoT Brings New Value, New Risks
The Internet of Things brings tremendous potential value, but also a new threat environment. A German steel plant's experience shows how big the risk can be.
Understanding Today’s Security Landscape
In the digital age, the security landscape only continues to become more complex, and well into 2017, we continue to witness the escalation of security threats across almost every industry. Especially, we are seeing a marked increase in the sophistication of security threats as they hit the front page news. Why do hackers want your […]
April 18th #CiscoChat: With cybercrime on the rise, is your financial institution secure?
Join our panel of Cisco experts and analysts on Tuesday, April 18th, as they dive into the importance of a secure network foundation for the financial services industry.
“Time to Evolve” Analysis Yields New Insight on Malware Obfuscation Techniques and Adds Dimension to “Time to Dete …
[Blog authored by Aaron Weis and Samuel Wigley] Cisco has been measuring our security products’ median “time to detection” (TTD) — the window of time between a compromise and detection of a threat — since 2015. This exercise is a way for us to benchmark our progress, and continually refine our approach, to detecting threats. […]
Cisco 2017 Annual Cybersecurity Report: The Hidden Danger of Uninvestigated Threats
Responding to security threats requires time, talent and money — resources that most security professionals would agree are in seemingly short supply. As discussed in the Cisco 2017 Annual Cybersecurity Report (ACR), security teams seek out strategies such as automated security solutions or cloud-based tools to overcome these resource constraints. Effective security requires automation and […]