Cisco Zero Trust
The Risk-Conscious, Security-Aware Culture: The Forgotten Critical Security Control
3 min read
A risk-conscious culture is a necessary component of a cybersecurity and risk management strategy. It is essential in the overall cybersecurity posture.
Cisco SD-Access May Just Be the Vaccine You Need to Combat the Digital Pandemic
4 min read
With a “Never Trust, Always Verify” approach, Cisco SD-Access’ core focus is to minimize data breaches by stopping east-west infections and reducing the attack surface across the enterprise network.
A Conversation on Zero Trust for the Modern World
6 min read
I recently had a conversation with Cisco’s VP/GM of Zero Trust and Duo, Ash Devata, for a discussion about zero trust principles in the modern world.
Extending Zero Trust Security to Industrial Networks
4 min read
Embracing the digital industry revolution requires data to seamlessly flow. Look at how the Zero Trust security model can help you secure your operations.
Key Takeaway from the Colonial Pipeline Attack
5 min read
The recent cyber-attack on the Colonial Pipeline had a major impact on the life of millions of Americans. What can we learn from it to start properly securing critical infrastructures?
Exposing hidden cyber supply chain risks
3 min read
This blog covers cyber supply chain risks, including the software and island hopping attacks. Register for the Supply Chain Summit on May 26.
The Rise of Resilience – Security in 2021 and Beyond
5 min read
In case you missed it, check out our news from the RSA Conference! Find out how we’re helping companies build resilience in the face of uncertainty.
Cisco empowers the endpoint and unleashes XDR capabilities from the SecureX Platform
2 min read
This first anniversary of SecureX, we are accelerating our customers’ ability to gain unified visibility more quickly from our SecureX platform.
Passwordless authentication enhances but doesn’t replace access security strategy
4 min read
Passwordless is exciting technology. It promises to revolutionize the way we authenticate online. However, passwordless is still only one part of a holistic security strategy.