Cisco Cybersecurity
Keeping the lights on: Brazilian power utility wins cybersecurity award for securing grid network with Cisco
3 min read
Utilities face stricter cybersecurity regulations and increasing cyberthreats. Learn how CPFL Energia’s OT and IT teams secured grid operations with Cisco Cyber Vision, built into Cisco industrial switches.
Gain control over OT remote access with session monitoring, recording, and termination
2 min read
Learn how Cisco Secure Equipment Access gives you visibility into active and past remote access sessions, lets you terminate an active session if something doesn’t look right, and record sessions for training or forensics.
Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)
3 min read
Industrial cybersecurity needs granular security policies. This requires visibility into what assets are connected. Learn how Cisco and Rockwell are enabling OT visibility into CPwE with Cyber Vision.
OT remote access: can you trust your technician’s laptop?
3 min read
Discover how Cisco Secure Equipment Access enables clientless and agent-based ZTNA remote access and checks device security posture by integrating with Cisco Duo.
Distributed ZTNA enables simple and scalable secure remote access to OT assets
4 min read
Zero trust network access (ZTNA) is the ideal architecture for securing remote access to enterprise resources. But in OT environments, ZTNA needs to be distributed.
You’re ready for the new SEC cybersecurity rules. Have you included your OT?
4 min read
New rules from the U.S. Securities and Exchange Commission (SEC) have implications on public companies’ cybersecurity posture. Learn how Cisco can help.
Complying with the new TSA mandates to secure the nation’s critical infrastructure
3 min read
Protecting the nation’s critical infrastructure requires strong cybersecurity controls. Being an industry leader in networking and security across both IT and OT, Cisco is uniquely positioned to help you comply with the latest TSA mandates. Learn what the requirements are.
Zero Trust Blueprint: Safeguarding Manufacturing Operations from Cyber Threats
1 min read
In a zero trust environment, no person, device, or resource is considered secure. Networks are treated as continuously under attack and use a series of verifications to grant access to a specific user, at a specific time, to use a specific resource or functionality.
Tackling phishing in New Zealand
5 min read
We propose strategies of how New Zealand organisations can close their security gaps with protection against phishing, stolen credentials and other threats.
2