Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world.
Securing Access to Our Nation’s Critical Infrastructure
Threats to energy and utilities firms target enterprise IT networks - here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks.
Disruption on High: Managing Cyber Risk in a Multicloud World
Digital transformation is happening and with it comes the pain of disruption. For many organizations around the world, it looks like this...
Securing the Cloud: Assessing the Security of TLS
Moving from self-hosted infrastructure to cloud-based environments increases the demand for resiliency and security. Cisco's cloud security solutions give our customers the visibility they desire.
Leveraging Cloud Environments for Security and Speed
The benefits and challenges of the new normal In the Pacific Northwest, the weather, especially in the spring, can be pretty variable. Just look at this tweet from the National Weather...
Serverless Security for Public Cloud Workloads with Stealthwatch Cloud
Businesses absolutely love serverless computing because of the reduced IT administrative burden, but delegation of control to the service provider also delegates the detection, mitigation, and remediation of threats.
DevSecOps: Security at the Speed of Business
In Part One of this blog series DevSecOps - Win Win for All, we established a foundation for DevSecOps practices with our Cloud Security Manifesto. In Part 2 of this series, we will describe another key aspect of DevSecOps – developing security guardrails with a hands-on approach via Agile hackathons.
Meltdown, Spectre, and Cisco Cloud Collaboration Security
Quick answers re: Cisco’s cloud collaboration portfolio, Meltdown and Spectre: Spark E2E encryption stores encrypted data separately from access controls, and Cisco Spark cloud only processes information in encrypted form.