Security resilience: Moving beyond the buzzword
Set out to define what security resilience means in the real world—with real programs—and more importantly, codify how organizations are building it successfully.
Reality Check on Cybersecurity: 9% of Companies in Europe are Ready to Defend Against Cyber Threats
The urgency around addressing the EU’s cyber shortcomings is well founded. A mere 9% of organizations in Europe have the ‘Mature’ level of readiness needed to be resilient against today’s cyber risks.
Regulatory Harmonization in Cyber Incident Reporting: Best Idea for Security?
In March 2022, the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) was enacted in the U.S. with a clear purpose to improve the nation’s cybersecurity by requiring covered entities to report significant cyber incidents, including payments made for ransomware attacks. The law, and its rulemaking that is required of the Department of Homeland Security’s […]
Can you hire your way to security resilience?
Proven strategies to implement into your security culture that can have a big impact on both your hiring and retention practices.
The Power of Relationships: Executive Buy-In and Security Culture for Bolstering Resilience
Findings from Cisco's Security Outcomes Report spotlight the importance of executive buy-in and a security culture in bolstering resilience.
Why Zero Trust Helps Unlock Security Resilience
Findings from Cisco's Security Outcomes Report spotlight the importance of mature zero trust implementation in building security resilience.
Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report
What does security resilience mean and how do you crack the code? Cisco tackles this question in our latest Security Outcomes Report.
Cybersecurity is a Team Sport
Our first Center of Excellence and Co-Innovation focusing on cybersecurity and privacy will open in Milan in 2020, bringing together public and private sector experts to research unique solutions.
Customers Deserve Transparency to Manage Risk
Regardless of how they are found, all vulnerabilities are investigated and publicly reported per our policies.