Security Services

February 28, 2018

SECURITY

The Power of Logging in Incident Response

4 min read

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...

February 9, 2018

SECURITY

How to Overcome Privacy Program Stumbling Blocks

6 min read

The need to have a strong data privacy and protection plan continues to heat up. The more we share, the more market researchers gather information on their consumers, the more...

January 9, 2018

SECURITY

Security or Innovation?

1 min read

I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In order to foster innovation at […]

January 8, 2018

SECURITY

Incident Response: Are you ready?

2 min read

We created a short eBook to help security professionals deal with“what if” scenarios by building and strengthening incident response plans, thereby identifying what to do when things go wrong.

November 29, 2017

SECURITY

Dissecting a Breach: The Process of Incident Response

6 min read

On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.”  This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work.  We […]

November 2, 2017

SECURITY

Extend Your Security to the Cloud with Confidence

2 min read

Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]

October 19, 2017

SECURITY

Business Critical Security

2 min read

Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts:  when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train your team on information security […]

October 11, 2017

SECURITY

Security in Your DNA: Tips for Securing Your Network

3 min read

Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation...