Remote Working: Endpoints Have Left the Building
Remote working is top of mind. But increasing the numbers of end-points attached to your agency's network can also increase cyber threats. Are you prepared?
How to secure the modern utility grid
Utilities are embracing modernization efforts to increase efficiency and reliability and enable renewable energy. But there’s another trend utilities must account for: cyberattacks. Attacks in July of 2019 against the US and in December of 2015 against the Ukraine power grid proved that a cyberattack can take utilities offline, endangering lives and incurring significant financial […]
Understanding the Shared Responsibility Model: Securing Public Cloud Just Got Easier
Securing public cloud assets and services is critical, but deciding how or what is secured can be confusing. The shared responsibility model clarifies who is responsible for securing what, strengthening your security posture.
Why Do Network and Application Performance Need to Be Superior?
Question: Is there still a need for more network capacity and performance enhancements to fixed and mobile networks? Answer: Yes! And tomorrow’s tactile Internet needs and requirements will be met by 5G, Wi-Fi6 and FTTH innovations that support emerging applications (and new services that are just in the ideation phase today). At the beginning of […]
Cisco Wins Global Excellence for Cybersecurity Education and Awareness
This award for our Keep Cisco Safe campaign represents our relentless effort to drive pervasive security, trust, data protection, and privacy into everything we do at Cisco.
Women at Cisco take on the Cyberstart Challenge – Will You?
At Cisco, we wanted to create an internal competition to encourage our Women in Cybersecurity community members to step out of their comfort zone and learn new areas of cybersecurity. Nearly one hundred Cisco women across the globe participated in the CyberStart Challenge.
Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust
According to Cisco’s 2020 CISO Benchmark Report, more than half (52%) of the respondents said that mobile devices are now extremely challenging to defend. Duo aims to solve this challenge by making it easy for organizations to enforce endpoint compliance and maintain cyber hygiene.
We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.
Are you leaving your most valued assets up for grabs?
How do you secure your most valued assets—applications? Apps are the number 1 moving target for sophisticated attacks. Read more to see how micro-segmentation with Cisco Tetration can take help you automate security for your applications.