Security Services

February 28, 2018


The Power of Logging in Incident Response

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...

February 9, 2018


How to Overcome Privacy Program Stumbling Blocks

The need to have a strong data privacy and protection plan continues to heat up. The more we share, the more market researchers gather information on their consumers, the more...

January 9, 2018


Security or Innovation?

I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In order to foster innovation at […]

January 8, 2018


Incident Response: Are you ready?

We created a short eBook to help security professionals deal with“what if” scenarios by building and strengthening incident response plans, thereby identifying what to do when things go wrong.

November 29, 2017


Dissecting a Breach: The Process of Incident Response

On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.”  This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work.  We […]

November 2, 2017


Extend Your Security to the Cloud with Confidence

Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]

October 19, 2017


Business Critical Security

Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts:  when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train your team on information security […]

October 11, 2017


Security in Your DNA: Tips for Securing Your Network

Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation...