2016 – What a Year for Cisco Security
What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t...
What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t...
Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams
Wendy Bahr said it best at Partner Summit: “to move with speed, we have to simplify”. But how can you cut through the clutter and not only reach your target audience, but reach them with something that spurs action and pushes results? Our distribution
It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then
This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...
No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping...
Many colleagues, customers, and Cisco partners have asked me, “Why isn’t Cisco AMP for Endpoints included in Gartner’s recent Magic Quadrant for Endpoint Protection Platforms (EPP)?” The answer to us is pretty simple. AMP was not categorized as a
The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to