Cisco Midyear Security Report

August 22, 2017

GOVERNMENT

CYBERCOM comes into its own

2 min read

The creation of CYBERCOM eight years ago demonstrated that the government saw the potential of cyberattacks as a national security threat; the elevation shows that the perceived risk is even greater now — a correct perception, to be sure.

August 14, 2015

SECURITY

A Global Cybergovernance Framework: The Real Infrastructure Needed to Support a More Secure Internet

2 min read

As part of a broader “Cybersecurity Call to Action” outlined in the Cisco 2015 Midyear Security Report, Cisco has called for the development of a cohesive, multi-stakeholder, global cybergovernance framework. Investing in the development of such a framework is essential to supporting innovation and economic growth in business on the global stage. While there has […]

August 11, 2015

PERSPECTIVES

#CiscoChampion Radio S2|Ep 31. 2015 Midyear Security Report

1 min read

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking about the Cisco Midyear Security Report with Cisco Marketing Manager Kevin Parra. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco SME Kevin Parra, Cisco Marketing Manager Cisco […]

August 10, 2015

SECURITY

Threat Vectors for Criminals: Common Coding Errors and Open-Source Vulnerabilities

3 min read

Coding errors in software products provide easy paths of entry for online criminals, who can exploit vulnerabilities to compromise systems or launch additional attacks and malware. As reported in the Cisco 2015 Midyear Security Report, certain types of coding errors consistently appear on lists of most common vulnerabilities. This raises an important question for vendors […]

August 3, 2015

SECURITY

We Who Cut Mere Stones Must Always Be Envisioning Cathedrals

3 min read

The well-known Quarry Worker’s Creed, called out in prefaces to books such as “The Pragmatic Programmer” and “Ship While you Sleep”, posits the notion of IT...

July 30, 2015

SECURITY

Change is Coming to the Security Industry – and This is a Good Thing

3 min read

Cisco presents a vision of the future in the Cisco 2015 Midyear Security Report that we expect many—particularly in the security industry—might find a little controversial. We suggest that over the next five years, there will be a continued wave of industry consolidation—driven less by financially motivated M&A and more by the need for capable […]

July 29, 2015

SECURITY

Midyear Security Report: Exploit Kits and Ransomware Get Creative

3 min read

The modern online adversary is out to make money, not simply hack networks for the fun of it. In the Cisco 2015 Midyear Security Report, there’s yet more evidence that criminals are using tools with ever-increasing sophistication to steal valuable personal or financial data and sell it, coerce users into paying ransoms for their own […]

September 30, 2014

EXECUTIVE PLATFORM

Security Must Mature to Protect Against Threats

4 min read

As we discuss in the Cisco Midyear Security Report, cybersecurity is becoming more of a strategic risk for today’s businesses, creating a growing focus on achieving “security operations maturity.” That’s why Cisco has developed the Security Operations Maturity Model – to help organizations understand how security operations, technologies, and products must evolve to keep up […]