Risk Management
The Overlooked Risks in Supply Chain Security
1 min read
Your business's security is only as strong as your supply chain. Discover the overlooked risks and expert insights.
Ensuring Security in M&A: An Evolution, Not Revolution
6 min read
Through decades of acquisitions, Cisco has gained the expertise and experience to make M&A seamless and successful by making cybersecurity a priority throughout the integration process.
Making Merger and Acquisition Cybersecurity More Manageable
4 min read
Part of the secret to Cisco’s success is its ability to acquire companies that strengthen its technology portfolio and securely integrate them into the larger organization.
Security or Innovation?
1 min read
I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In order to foster innovation at […]
Take Seriously This Sentence in the Cybersecurity Executive Order
1 min read
There's a lot in the order, but one aspect of it should command your attention.
Cybersecurity for Defense: Cisco Supports the NIST Risk Management Framework
2 min read
In our Cybersecurity for Defense Blog Series Kickoff, Peter Romness mentioned that we at Cisco are hard at work delivering advanced cybersecurity capabilities that support the Department of Defense Cyber Strategy. That’s certainly true, and each blog in our series will further that point. But it’s about more than just products and services. It’s also […]
Cisco to Expand Security Consultancy Services with Acquisition of Portcullis
1 min read
There’s no question that cybersecurity is top-of-mind for Fortune 500 companies. This, compounded by a significant global security talent shortage, contributes to the burgeoning need for security companies to deliver...
Responsive Security in Action
4 min read
In 2013, our internal Information Security team carried out a series of controlled anti-phishing exercises. The purpose was to raise employees' awareness of potential spear phishing attacks through emails. Spear phishing has been a common first step for Advanced Persistent Threat (APT) attacks to gain access to a user's system before launching further attacks at internal targets. As such, if employees are vigilant against such attack patterns, we should effectively reduce the risk of successful APT attacks involving email phishing.
Getting More Responsive Security by Learning From Disaster Responses
5 min read
Editor’s Note: In the two previous blogs, we discussed some of the issues and dilemmas found within information security knowledge and practice domains. Those challenges arise fundamentally from the traditional approach that many organizations have adopted to address information security requirements. In this fourth installment, we look at how good preparation can improve security outcomes, […]