Cisco Zero Trust
The Rise of Resilience – Security in 2021 and Beyond
In case you missed it, check out our news from the RSA Conference! Find out how we’re helping companies build resilience in the face of uncertainty.
Cisco empowers the endpoint and unleashes XDR capabilities from the SecureX Platform
This first anniversary of SecureX, we are accelerating our customers’ ability to gain unified visibility more quickly from our SecureX platform.
Passwordless authentication enhances but doesn’t replace access security strategy
Passwordless is exciting technology. It promises to revolutionize the way we authenticate online. However, passwordless is still only one part of a holistic security strategy.
Cisco Live 2021 – Highlights from a fresh perspective!
Attending Cisco Live for the first time as an employee gave me a new perspective. This blog summarizes my main takeaways from this years virtual event.
Cisco’s Vision for SASE and a Brand New Offer to Kickstart Your Journey
Discover Cisco’s vision for Secure Access Service Edge (SASE) and how it can radically simplify your security in this blog by Gee Rittenhouse and James Mobley.
Future Focused: A Safer Way to Expose Private Server Names
Working to stay ahead of bad actors and keep our costumers secure is our priority, that's why we’re exploring a safer way to publicly advertise private services within an organization. It’s a concept we’re calling Auth-DoH.
MITRE ATT&CK: The Magic of Application Mitigations
This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.
What is Clinical Zero Trust?
#HealthcareNow takes on- and off-site network security seriously. Join us for a three-part series exploring best practices for securing networks and data through clinical zero trust.
Canadian Bacon – Zero to Hero when it comes to Zero-Trust
Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.