Cisco FirePOWER

June 22, 2017

GOVERNMENT

Cisco, Intel speed battlefield decision-making

Battlefield decisions have to be lightning quick. Thanks to Cisco and Intel, special operations forces can now have more information at their fingertips for making those judgment calls. At this...

June 9, 2017

THREAT RESEARCH

Threat Round-up for June 2- June 9

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 02 and June 09. As with previous round-ups, this post isn't meant to be an...

#SHOWMESECURITY: Protect Network Assets with a Security Strategy

CCI’s Security Solution Director, Andy Erickson, gives a brief re-cap on the recent NTCA IP Vision event happening in St. Louis, MO. Much of the event’s conversations focused on cybersecurity and taking the next steps towards protecting network assets.

March 6, 2017

PERSPECTIVES

Firepower 2100 – The Architectural “Need to Know”

Take a tour of the last few generations of Cisco firewall and their architecture to see why the Firepower 2100 is not at all like the Firepower 4100.

February 28, 2017

PERSPECTIVES

#CiscoChampion Radio, S4|Ep. 2: Security and ASICs

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen...

February 22, 2017

SECURITY

Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach

Business resiliency is job one for network operations teams. With our latest Firepower 2100 Series NGFWs, Cisco is helping our customers maintain network performance while they keep their data safe.

January 11, 2017

SECURITY

2016 – What a Year for Cisco Security

What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t...

December 20, 2016

THREAT RESEARCH

IEC 104 Protocol Detection Rules

IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and...

November 16, 2016

SECURITY

The Case for Next-Gen Intrusion Prevention to Protect Digital Business

Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business...