Cisco Security

December 15, 2021

CUSTOMER EXPERIENCE

Connecting Cars for a Better Experience

Cars are now traveling computers, enabled by Internet of Things (IoT) connectivity. Consumers are demanding the services, safety and intelligence enabled by connected cars and enterprises are benefitting from new business opportunities. Learn how Cisco is a valued partner and innovator to help customers benefit from our growing connected world.

November 4, 2021

SECURITY

Honoring our ‘Cybersecurity Defender of the Year’

Sharing security insight is now more important than ever. Today we honor our ‘Cybersecurity Defender of the Year’ for his passionate collaboration and advocacy.

October 14, 2021

CISCO INSIDER VOICES

Dublin school digitizes learning with Cisco-powered network

Dublin private school emerged from the pandemic with a more effective, more secure approach to student-driven learning, powered by a Cisco network.

October 6, 2021

PARTNER

Battle the Scourge of Ransomware with Cisco and Cohesity

Cisco SecureX and Cohesity Helios have been integrated to automate detection, response, and recovery in the face of ransomware attacks. This is the first data protection solution integrated with SecureX, ensuring data-level security in addition to securing networks, clouds, endpoints, and applications.

July 5, 2021

SECURITY

Mapping Secure Endpoint (and Malware Analytics) to NIST CSF Categories and Sub-Categories

This blog articulates how Cisco Secure Endpoint with Malware Analytics is aligned to NIST Cybersecurity Framework (NIST CSF) Categories and Sub-Categories.

April 30, 2021

DEVELOPER

Developing Integrations and SecureX Orchestration Workflows… Together!

Now there's a place where these subject matter experts and other developers can connect around Cisco security APIs and SecureX Orchestration. Learn more about the new DevNet Developer Security Community.

April 29, 2021

PARTNER

To Buy or To Build: Developing Your Security Operations Center

Data lies at the heart of all security operations. Like other networking operations, security relies on the ability to trust the data.