network security
Threat Explainer: Supply Chain Attacks
6 min read
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Developing Integrations and SecureX Orchestration Workflows… Together!
3 min read
Now there's a place where these subject matter experts and other developers can connect around Cisco security APIs and SecureX Orchestration. Learn more about the new DevNet Developer Security Community.
Building Trust in Your Access Network
3 min read
With 5G deployments gaining traction, routers are now increasingly deployed in distributed, remote architectures and depended on as critical infrastructure. Cisco’s trustworthy platforms ensure customers can validate the authenticity of their devices in both hardware and software to help eliminate malicious access to the network and significantly improve the CSP’s security posture.
Part 2: Manufacturers, it’s time to reboot network security
3 min read
In "Part 2" of this blog series, learn more about the benefits of digitized and interconnected manufacturing operations.
Part 1: Manufacturers, it’s time to reboot network security
2 min read
When manufacturing operations are digitized and interconnected, there’s more potential exposure and greater need for proactive protection.
Trusted Internet Connection: A Renewed Focus on Resiliency
2 min read
In light of the pandemic, federal government agencies had to redesign how they enable connectivity, provide secure access, and protect security for users around the country and all over the world. Government organizations have made great strides towards adopting new principles that support modernization and evolve toward policies that are rooted in foundations of zero-trust.
The malware is in my factory…now what?
5 min read
Editor’s note: To learn more about securing the manufacturing cell, check out the latest episode of our Manufacturing Leader’s podcast, available now. Take a listen below or listen on our site. A growing problem As we’ve been seeing in many headlines and articles, there is a clear awareness that the manufacturing floor is under attack. […]
Learn How to Secure Your Cloud-native Applications and Infrastructure – Part 3, Cisco Stealthwatch Cloud
2 min read
Learn how Cisco Stealthwatch Cloud can give you visibility into your public cloud resources, and detect threats in your application environment.
Under Analytics
3 min read
As more organizations turn to SaaS options for monitoring and managing their network security, it’s time to revise how we look at the network being “under management.”