National Institute for Standards and Technology (NIST)
Enabling Cyber Resiliency with NIST, Cisco Security, and Splunk
4 min read
Cyber resilience for the US Public Sector can be significantly enhanced through the NIST Cybersecurity Framework 2.0, Cisco Security Portfolio, and Splunk, which together provide a comprehensive approach to managing and mitigating cyber risks.
Labels for Consumer IoT Devices? Cisco’s View
2 min read
Cisco actively works with the FCC and other government agencies, industry, and consumers to discuss cybersecurity labeling for Internet of Things (IoT) devices, and to build trust in the network we all rely on to live, work, and play in today’s interconnected world.
Hear the Latest on NIST’s Cybersecurity Framework 2.0 (and Beyond)
2 min read
Learn about the NIST Cybersecurity Framework 2.0, exploring its broadening impact and vital role in safeguarding organizations' mission outcomes.
Critical Software Security and the Cyber Executive Order
3 min read
Executive Order 14028 directs NIST to define critical software and key security measures. Get NIST’s latest guidance and how Cisco can help.
Mapping Secure Endpoint (and Malware Analytics) to NIST CSF Categories and Sub-Categories
5 min read
This blog articulates how Cisco Secure Endpoint with Malware Analytics is aligned to NIST Cybersecurity Framework (NIST CSF) Categories and Sub-Categories.
Cisco Secure: Supporting NIST Cybersecurity Framework
2 min read
Mapping Cisco Security Products to NIST Cybersecurity Framework Categories. We discuss the basics of NIST then extend the mapping done earlier.
Cybersecurity Executive Order: Cisco Stands Ready
3 min read
Recently, the Biden Administration issued a new executive order on improving the nation’s cybersecurity. Cisco stands ready to assist - discover the technologies that will make it happen in our latest blog.
MITRE ATT&CK: The Magic of Mitigations
3 min read
When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an attacker made sense, and its structure was clear. Then came the “now what?” moment. Soon I discovered the key to getting started. May I share it with you?
Get a compliant “Cloud Smart” approach to security with Stealthwatch Cloud
2 min read
US Public Sector customers can now secure sensitive workloads and meet regulatory standards with Stealthwatch Cloud in AWS GovCloud