network security
Emotet is Back
5 min read
We summarise in this blog Emotet threat, it’s lifecycle and typical detectable patterns. In the second part of the blog we show how to use GTA.
Increase the Performance and Security of Your Network
2 min read
Learn how Cisco's Service Mesh Manager — an add-on to Cisco Intersight — improves observability of component traffic and health for container-based applications that need to scale.
So, what’s the big deal about ISE 3.x?
4 min read
There is a lot of chatter around the 3.x release for Cisco Identity Services Engine, known to over 45,000 customers as ISE. So, what’s the big deal about ISE 3.x?
New Warning from the White House Calls for Urgent Action
3 min read
Based on evolving intelligence, President Biden warned of increased potential of cyberattacks on critical infrastructure in the United States. His administration renewed its calls for all organizations to bolster their cyber defenses. Learn how Cisco can help.
Continuity and recovery on the path towards resiliency
4 min read
Effective business continuity & disaster recovery (BCDR) should be a key component of 2022 security roadmaps. Our Advisory CISO explains why and analyzes key findings from our new #SecurityOutcomes Study.
Use “Scorecards” to Check on Security of Your Open Source Projects
1 min read
Watch the Snack Minute interview with Stephen Augustus, Head of Open Source at Cisco, about Scorecard and how you use them to improve the security of your project.
Five myths of IoT/OT cybersecurity: Far from the (hard) truth!
2 min read
The industrial cybersecurity market largely remains a mystery to many. Debunk some of the myths that leave industrial organizations dangerously exposed.
NFL Teams Up with Cisco to Secure Super Bowl LVI
3 min read
In security, preparedness is often the name of the game. That’s why the NFL teamed up with Cisco to secure its Super Bowl LVI network infrastructure.
How Exploit Intel Makes You Less Vulnerable
3 min read
Kenna and the Cyentia Institute's latest research indicates effective risk-based prioritization and risk reduction hinges on exploit intel.