NetWORK: Redefining Network Security
It’s a new day for network security. Major Secure Firewall announcements: announcing Secure Firewall Threat Defense 7.0 and our NetWORK security vision.
Pipeline Security Tunnel Vision
A lot of hype has been associated with pipeline cybersecurity. Often, claims are overwrought. Practitioners should mainly focus on security practices.
Threat Explainer: Supply Chain Attacks
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Developing Integrations and SecureX Orchestration Workflows… Together!
Now there's a place where these subject matter experts and other developers can connect around Cisco security APIs and SecureX Orchestration. Learn more about the new DevNet Developer Security Community.
Building Trust in Your Access Network
With 5G deployments gaining traction, routers are now increasingly deployed in distributed, remote architectures and depended on as critical infrastructure. Cisco’s trustworthy platforms ensure customers can validate the authenticity of their devices in both hardware and software to help eliminate malicious access to the network and significantly improve the CSP’s security posture.
Part 2: Manufacturers, it’s time to reboot network security
In "Part 2" of this blog series, learn more about the benefits of digitized and interconnected manufacturing operations.
Part 1: Manufacturers, it’s time to reboot network security
When manufacturing operations are digitized and interconnected, there’s more potential exposure and greater need for proactive protection.
Trusted Internet Connection: A Renewed Focus on Resiliency
In light of the pandemic, federal government agencies had to redesign how they enable connectivity, provide secure access, and protect security for users around the country and all over the world. Government organizations have made great strides towards adopting new principles that support modernization and evolve toward policies that are rooted in foundations of zero-trust.