The Power of Logging in Incident Response
A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...
How to Overcome Privacy Program Stumbling Blocks
The need to have a strong data privacy and protection plan continues to heat up. The more we share, the more market researchers gather information on their consumers, the more...
Security or Innovation?
I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In order to foster innovation at […]
Incident Response: Are you ready?
We created a short eBook to help security professionals deal with“what if” scenarios by building and strengthening incident response plans, thereby identifying what to do when things go wrong.
Dissecting a Breach: The Process of Incident Response
On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work. We […]
Prevention or Cure? Focusing your Cybersecurity Efforts and Investments
An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organization against a cyber attack, it’s essential to factor in both.
Extend Your Security to the Cloud with Confidence
Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]
Business Critical Security
Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts: when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train your team on information security […]
Security in Your DNA: Tips for Securing Your Network
Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation...