CISO

April 15, 2020

SECURITY

Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt …

Episode 3 of our Security Stories podcast is now live, and you won't want to miss our interview with the amazing Theresa Payton. From life inside The White House, to online privacy, to how to recruit for cybersecurity roles, it really is a fascinating listen! Learn more about this weeks episode in our latest blog:

March 16, 2020

SECURITY

Launching today: Security Stories podcast

A cybersecurity podcast from the Cisco Security team. Featuring in depth interviews with CISOs and security leaders

March 6, 2020

SECURITY

Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust

According to Cisco’s 2020 CISO Benchmark Report, more than half (52%) of the respondents said that mobile devices are now extremely challenging to defend. Duo aims to solve this challenge by making it easy for organizations to enforce endpoint compliance and maintain cyber hygiene.

March 3, 2020

SECURITY

Security Reimagined

We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.

February 18, 2020

SECURITY

The Voice of the CISO Customers – CISO Day in Europe

Key insights from CISOs during Cisco Live Europe teach us how to lead with influence, connect security to the business, address skill shortage and protect industrial IoT environments.

December 20, 2019

SECURITY

The 3 W’s in Zero Trust Security

“Always check, never trust” – learn why moving from a perimeter model to zero trust security can help protect your workforce, workload and workplace.

October 22, 2019

SECURITY

How much security do you really need?

According to our new report, "The Security Bottom Line," no matter how large your budget is, you're not likely to feel that you have everything needed to secure your environment.

October 3, 2019

SECURITY

Threat Hunting: How to Gain the Most Value

As security practitioners who continuously look for adversarial malice, one of the questions we are asked frequently is: What’s around the corner?