Cisco Zero Trust
Passwordless authentication enhances but doesn’t replace access security strategy
4 min read
Passwordless is exciting technology. It promises to revolutionize the way we authenticate online. However, passwordless is still only one part of a holistic security strategy.
Cisco Live 2021 – Highlights from a fresh perspective!
2 min read
Attending Cisco Live for the first time as an employee gave me a new perspective. This blog summarizes my main takeaways from this years virtual event.
Cisco’s Vision for SASE and a Brand New Offer to Kickstart Your Journey
5 min read
Discover Cisco’s vision for Secure Access Service Edge (SASE) and how it can radically simplify your security in this blog by Gee Rittenhouse and James Mobley.
Future Focused: A Safer Way to Expose Private Server Names
2 min read
Working to stay ahead of bad actors and keep our costumers secure is our priority, that's why we’re exploring a safer way to publicly advertise private services within an organization. It’s a concept we’re calling Auth-DoH.
MITRE ATT&CK: The Magic of Application Mitigations
5 min read
This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.
Canadian Bacon – Zero to Hero when it comes to Zero-Trust
5 min read
Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.
Trusted Internet Connection: A Renewed Focus on Resiliency
2 min read
In light of the pandemic, federal government agencies had to redesign how they enable connectivity, provide secure access, and protect security for users around the country and all over the world. Government organizations have made great strides towards adopting new principles that support modernization and evolve toward policies that are rooted in foundations of zero-trust.
It’s a new year. What do we do now?
4 min read
While we can hopefully assume that this year will bring more stability, there will always be some level of uncertainty. Learn how to maintain effective security even during challenging times.
MITRE ATT&CK: The Magic of Segmentation
4 min read
It's easy to overlook essential suppliers, partners, and service providers as possible pathways for cyberattacks. But the shocking cyberattack discovered in December shined a bright light on supply chain vulnerabilities, showing how trust can be exploited.
2