security
Cisco Secure Application: A New Approach to Application Security
2 min read
Applications are the lifeblood of digital business. Cisco is bringing the best of AppDynamics and Security to secure applications, to help application and security teams protect their environments, and applications at runtime.
Webex: Setting the Standard for Security and Compliance with New Tools to Keep Your Meetings and Content Safe and Secure
4 min read
See how the all new Webex is working to keep your data secure, ensure privacy, and helping you to meet your compliance challenges.
Delivering Cybersecurity Automation with NWN and SecureX – AMER Partner Spotlight
2 min read
Cisco SecureX has made our great partner relationships even better. Cisco Secure partner NWN is an outstanding example. Check out our last blog in our 3-part series to learn what NWN is doing to deliver outstanding results with SecureX.
3 Must-dos to Secure Your Applications
1 min read
Three ways you can start securing your applications now: Secure workloads with Cisco Secure Workload, secure access with Cisco's Duo Beyond, and monitor the performance of apps with Cisco AppDynamics.
How Cisco Virtually Fosters a Culture of Travel
3 min read
Lisa shares her experience working in our Czech offices and experiencing the global culture of Cisco - that helps her to virtually 'travel' now.
RDP and the remote desktop
6 min read
Does your organization use RDP? In our latest Threat of the Month blog, we examine how bad actors leverage the protocol and what can be done to protect against attacks.
Preview: 2020 Manufacturing Virtual Summit November 9-10
2 min read
A lot has changed over the past several months. For the manufacturing industry, the changes have been sudden and drastic, with many manufacturers forced to shut down operations, while others had to find ways to continue their essential work. A lot still remains uncertain, and as we look forward to 2021, the question on everyone’s […]
Security in Open RAN Networks
4 min read
Many mobile network operators are considering deployment of open, decomposed, and modular radio access networks for 5G advanced wireless networks. The business rationale for adopting this network architecture is evident in light of the current state of the supply chain for network infrastructure. The current pool of vendors for technology in the Radio Access Network […]
Top 5 reasons to keep your Identity and MFA providers in sync
3 min read
Top 5 reasons to keep your Identity and MFA providers in sync By now, you may have heard about SecureX, Cisco’s new integrated platform that simplifies the security experience. SecureX is built into the Cisco security portfolio, and connects your entire security ecosystem for simplicity, better visibility, and greater operational efficiency. SecureX sign-on is one […]
2