What are you missing when you don’t enable global threat alerts?
Network telemetry can identify user behaviors, malicious tools installed in enterprise environments, and malware itself. Are you applying a global view to your network? If not, read on to learn more.
#CiscoChampion Radio, S4|Ep. 2: Security and ASICs
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen...
The impact on network security through encrypted protocols – HTTP/2
This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast and […]
Attackers Evolve Tactics to Infiltrate Your Network via Email
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]
Improving Email at Cisco Part 1 – The IT Technology Side
My personal email has 4 characteristics that drive me crazy: I get way too much email Most of my emails are a waste of time Emails carry the risk of, very rarely, nasty virus payloads (or link you to sites that have worse) Despite all this, I can’t live without email
Securing Cloud Transformation through Cisco Domain Ten Framework v2.0
Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top concern for Security. With rise of applications, transactions and data in the Cloud, […]
Happy New Exploit Kits! (I mean Happy Belated New Year!)
This article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco Cloud Web Security, particularly in conjunction with Cisco ASAs, to reduce the risk of your networks and users falling victim to these exploit kits.