Cisco Zero Trust
Cisco Live 2021 – Highlights from a fresh perspective!
Attending Cisco Live for the first time as an employee gave me a new perspective. This blog summarizes my main takeaways from this years virtual event.
Cisco’s Vision for SASE and a Brand New Offer to Kickstart Your Journey
Discover Cisco’s vision for Secure Access Service Edge (SASE) and how it can radically simplify your security in this blog by Gee Rittenhouse and James Mobley.
Future Focused: A Safer Way to Expose Private Server Names
Working to stay ahead of bad actors and keep our costumers secure is our priority, that's why we’re exploring a safer way to publicly advertise private services within an organization. It’s a concept we’re calling Auth-DoH.
MITRE ATT&CK: The Magic of Application Mitigations
This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.
What is Clinical Zero Trust?
#HealthcareNow takes on- and off-site network security seriously. Join us for a three-part series exploring best practices for securing networks and data through clinical zero trust.
Canadian Bacon – Zero to Hero when it comes to Zero-Trust
Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.
Trusted Internet Connection: A Renewed Focus on Resiliency
In light of the pandemic, federal government agencies had to redesign how they enable connectivity, provide secure access, and protect security for users around the country and all over the world. Government organizations have made great strides towards adopting new principles that support modernization and evolve toward policies that are rooted in foundations of zero-trust.
It’s a new year. What do we do now?
While we can hopefully assume that this year will bring more stability, there will always be some level of uncertainty. Learn how to maintain effective security even during challenging times.
MITRE ATT&CK: The Magic of Segmentation
It's easy to overlook essential suppliers, partners, and service providers as possible pathways for cyberattacks. But the shocking cyberattack discovered in December shined a bright light on supply chain vulnerabilities, showing how trust can be exploited.