National Institute for Standards and Technology (NIST)
Labels for Consumer IoT Devices? Cisco’s View
Cisco actively works with the FCC and other government agencies, industry, and consumers to discuss cybersecurity labeling for Internet of Things (IoT) devices, and to build trust in the network we all rely on to live, work, and play in today’s interconnected world.
Hear the Latest on NIST’s Cybersecurity Framework 2.0 (and Beyond)
Learn about the NIST Cybersecurity Framework 2.0, exploring its broadening impact and vital role in safeguarding organizations' mission outcomes.
Critical Software Security and the Cyber Executive Order
Executive Order 14028 directs NIST to define critical software and key security measures. Get NIST’s latest guidance and how Cisco can help.
Mapping Secure Endpoint (and Malware Analytics) to NIST CSF Categories and Sub-Categories
This blog articulates how Cisco Secure Endpoint with Malware Analytics is aligned to NIST Cybersecurity Framework (NIST CSF) Categories and Sub-Categories.
Cisco Secure: Supporting NIST Cybersecurity Framework
Mapping Cisco Security Products to NIST Cybersecurity Framework Categories. We discuss the basics of NIST then extend the mapping done earlier.
MITRE ATT&CK: The Magic of Mitigations
When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an attacker made sense, and its structure was clear. Then came the “now what?” moment. Soon I discovered the key to getting started. May I share it with you?
Get a compliant “Cloud Smart” approach to security with Stealthwatch Cloud
US Public Sector customers can now secure sensitive workloads and meet regulatory standards with Stealthwatch Cloud in AWS GovCloud
An Overview of Zero Trust Architecture, According to NIST
NIST recently released a draft publication, Zero Trust Architecture (ZTA), an overview of a new approach to network security. Get an overview of the key tenets, threats, and how to get visibility and continuous monitoring in a zero trust architecture.