network security

March 16, 2022

SECURITY

Continuity and recovery on the path towards resiliency

Effective business continuity & disaster recovery (BCDR) should be a key component of 2022 security roadmaps. Our Advisory CISO explains why and analyzes key findings from our new #SecurityOutcomes Study.

March 15, 2022

DEVELOPER

Use “Scorecards” to Check on Security of Your Open Source Projects

Watch the Snack Minute interview with Stephen Augustus, Head of Open Source at Cisco, about Scorecard and how you use them to improve the security of your project.

February 15, 2022

SECURITY

NFL Teams Up with Cisco to Secure Super Bowl LVI

In security, preparedness is often the name of the game. That’s why the NFL teamed up with Cisco to secure its Super Bowl LVI network infrastructure.

February 3, 2022

SECURITY

How Exploit Intel Makes You Less Vulnerable

Kenna and the Cyentia Institute's latest research indicates effective risk-based prioritization and risk reduction hinges on exploit intel.

January 26, 2022

SECURITY

How Well-integrated Tech Can Boost Your Organization’s Security

With security teams stretched thin and ever-evolving threats looming, having a well-integrated #security tech stack is a critical step for increasing efficiency and accuracy. But where does your journey towards integration begin? Learn more in Part 2 of our #SecurityOutcomes Study blog series.

January 25, 2022

SECURITY

EXPLORE Security 2022: A Behind the Scenes Look with Cisco at the Security Startup World

Our CISO Advisor team is partnering with Cisco Investments to host EXPLORE Security 2022 on February 23rd, and a chance to meet the companies.

January 14, 2022

SECURITY

There is no substitute for a CISO…or is there?

When CISOs invest time in a Deputy, they have the ability to cover more demands of the role, while preparing their organization for the future.

January 12, 2022

SECURITY

How to drive a successful, proactive tech refresh

Our new #SecurityOutcomes Study, Vol. 2, found that modern, well-integrated IT contributes to overall security program success more than any other practice. Learn more in Part 1 of our #CISO blog series.