NetWORK: Redefining Network Security
It’s a new day for network security. Major Secure Firewall announcements: announcing Secure Firewall Threat Defense 7.0 and our NetWORK security vision.
Cisco empowers the endpoint and unleashes XDR capabilities from the SecureX Platform
This first anniversary of SecureX, we are accelerating our customers’ ability to gain unified visibility more quickly from our SecureX platform.
Delivering simplified cybersecurity to small businesses
Small businesses have become targets for cybercriminals. Find out how Cisco cybersecurity works with service providers to protect SMBs from cyber threats.
Passwordless authentication enhances but doesn’t replace access security strategy
Passwordless is exciting technology. It promises to revolutionize the way we authenticate online. However, passwordless is still only one part of a holistic security strategy.
Threat Explainer: Supply Chain Attacks
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Cisco Secure Application: A New Approach to Application Security
Applications are the lifeblood of digital business. Cisco is bringing the best of AppDynamics and Security to secure applications, to help application and security teams protect their environments, and applications at runtime.
Learn How to Secure Your Cloud-native Applications and Infrastructure – Part 1 of 5
Learn how to stage the infrastructure, modify and deploy the application, and instrument the security products into the environment. Register for the October 27 webinar on Cisco Application First Security.
Application Security Comes into Further Focus with Intent to Acquire Portshift
10/26/2020 Update: We have completed the acquisition of Portshift. Welcome to Cisco! As the proliferation of cloud-native apps continues to accelerate with the aim to transact business efficiently and securely from anywhere, the security landscape is converging toward protecting both people and applications. Business agility requirements are pushing security up the stack and earlier in […]