network security

March 28, 2022

SECURITY

Emotet is Back

5 min read

We summarise in this blog Emotet threat, it’s lifecycle and typical detectable patterns. In the second part of the blog we show how to use GTA.

March 27, 2022

DEVELOPER

Increase the Performance and Security of Your Network

2 min read

Learn how Cisco's Service Mesh Manager — an add-on to Cisco Intersight — improves observability of component traffic and health for container-based applications that need to scale.

March 24, 2022

SECURITY

So, what’s the big deal about ISE 3.x?

4 min read

There is a lot of chatter around the 3.x release for Cisco Identity Services Engine, known to over 45,000 customers as ISE. So, what’s the big deal about ISE 3.x?

March 22, 2022

SECURITY

New Warning from the White House Calls for Urgent Action

3 min read

Based on evolving intelligence, President Biden warned of increased potential of cyberattacks on critical infrastructure in the United States. His administration renewed its calls for all organizations to bolster their cyber defenses. Learn how Cisco can help.

March 16, 2022

SECURITY

Continuity and recovery on the path towards resiliency

4 min read

Effective business continuity & disaster recovery (BCDR) should be a key component of 2022 security roadmaps. Our Advisory CISO explains why and analyzes key findings from our new #SecurityOutcomes Study.

March 15, 2022

DEVELOPER

Use “Scorecards” to Check on Security of Your Open Source Projects

1 min read

Watch the Snack Minute interview with Stephen Augustus, Head of Open Source at Cisco, about Scorecard and how you use them to improve the security of your project.

February 15, 2022

SECURITY

NFL Teams Up with Cisco to Secure Super Bowl LVI

3 min read

In security, preparedness is often the name of the game. That’s why the NFL teamed up with Cisco to secure its Super Bowl LVI network infrastructure.

February 3, 2022

SECURITY

How Exploit Intel Makes You Less Vulnerable

3 min read

Kenna and the Cyentia Institute's latest research indicates effective risk-based prioritization and risk reduction hinges on exploit intel.