Mapping Secure Endpoint (and Malware Analytics) to NIST CSF Categories and Sub-Categories
This blog articulates how Cisco Secure Endpoint with Malware Analytics is aligned to NIST Cybersecurity Framework (NIST CSF) Categories and Sub-Categories.
Cisco Secure: Supporting NIST Cybersecurity Framework
Mapping Cisco Security Products to NIST Cybersecurity Framework Categories. We discuss the basics of NIST then extend the mapping done earlier.
MITRE ATT&CK: The Magic of Mitigations
When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an attacker made sense, and its structure was clear. Then came the “now what?” moment. Soon I discovered the key to getting started. May I share it with you?
Get a compliant “Cloud Smart” approach to security with Stealthwatch Cloud
US Public Sector customers can now secure sensitive workloads and meet regulatory standards with Stealthwatch Cloud in AWS GovCloud
An Overview of Zero Trust Architecture, According to NIST
NIST recently released a draft publication, Zero Trust Architecture (ZTA), an overview of a new approach to network security. Get an overview of the key tenets, threats, and how to get visibility and continuous monitoring in a zero trust architecture.
One Security Framework to Address Zero Trust, NIST, CARTA, CDM, and HVA
Well, the industry now understands where Cisco is going! A modern security framework/architecture should be designed to cover all the important security frameworks and compliance requirements. Cisco has been developing...
The big myth about security patch management
There's a big myth out there about patching. Is it an easy fix? The truth is, effective security patch management for your network can be difficult. Is your network secure?
Following the Framework: Pro Tips From Cisco
The NIST Cybersecurity Framework is the core of the president’s recent cybersecurity executive order, and even before it became the foundation of a mandate it was darn good advice. However, there is no one easy way to align a given IT organization with the framework; each one has its own unique considerations, limitations and advantages. […]