Cisco Zero Trust

May 20, 2021

SECURITY

The Rise of Resilience – Security in 2021 and Beyond

In case you missed it, check out our news from the RSA Conference! Find out how we’re helping companies build resilience in the face of uncertainty.

May 12, 2021

SECURITY

Passwordless authentication enhances but doesn’t replace access security strategy

Passwordless is exciting technology. It promises to revolutionize the way we authenticate online. However, passwordless is still only one part of a holistic security strategy.

April 28, 2021

SECURITY

Cisco Live 2021 – Highlights from a fresh perspective!

Attending Cisco Live for the first time as an employee gave me a new perspective. This blog summarizes my main takeaways from this years virtual event.

March 30, 2021

SECURITY

Cisco’s Vision for SASE and a Brand New Offer to Kickstart Your Journey

Discover Cisco’s vision for Secure Access Service Edge (SASE) and how it can radically simplify your security in this blog by Gee Rittenhouse and James Mobley.

March 27, 2021

SECURITY

Future Focused: A Safer Way to Expose Private Server Names

Working to stay ahead of bad actors and keep our costumers secure is our priority, that's why we’re exploring a safer way to publicly advertise private services within an organization. It’s a concept we’re calling Auth-DoH.

March 17, 2021

SECURITY

MITRE ATT&CK: The Magic of Application Mitigations

This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.

March 11, 2021

HEALTHCARE

What is Clinical Zero Trust?

#HealthcareNow takes on- and off-site network security seriously. Join us for a three-part series exploring best practices for securing networks and data through clinical zero trust.

March 2, 2021

SECURITY

Canadian Bacon – Zero to Hero when it comes to Zero-Trust

Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.