network security
The Security Startup Ecosystem and the Trends Cisco is Watching
2 min read
The 2021 CISO Survival Guide to Emerging Trends From the Startup Ecosystem offers a unique take on the security landscape and transitions.
Why Implementation Groups Are So Important to CIS Controls v8
3 min read
We forgive you if you didn’t notice Implementation Groups as part of the CIS Controls before, but you should definitely know about them now.
Why Data Analysis Is So Important in Cyber Security
3 min read
New Learning Lab teaches you about Python Pandas, an open-source Python library that transforms data into a Python object to make it easier to visualize and analyze data that could be an indication of a cyber-attack.
Building a scalable RAVPN architecture in Oracle Cloud Infrastructure using Cisco Secure Firewall
3 min read
Learn how you can build a scalable RAVPN architecture in Oracle Cloud Infrastructure with Cisco Secure Firewall to provide employees secure remote access.
Mapping Secure Endpoint (and Malware Analytics) to NIST CSF Categories and Sub-Categories
5 min read
This blog articulates how Cisco Secure Endpoint with Malware Analytics is aligned to NIST Cybersecurity Framework (NIST CSF) Categories and Sub-Categories.
Should the CISO Report to the CIO?
4 min read
The reporting relationship that places the CISO under the CIO has come under scrutiny as the importance of cybersecurity has exploded.
A Conversation on Zero Trust for the Modern World
6 min read
I recently had a conversation with Cisco’s VP/GM of Zero Trust and Duo, Ash Devata, for a discussion about zero trust principles in the modern world.
Mapping Secure Network Analytics (and Cognitive) to NIST CSF Categories and Sub-Categories
4 min read
This blog articulates how Cisco Secure Network Analytics with Cognitive is aligned to NIST Cybersecurity Framework Categories
Extending Zero Trust Security to Industrial Networks
4 min read
Embracing the digital industry revolution requires data to seamlessly flow. Look at how the Zero Trust security model can help you secure your operations.
2