Zero Trust
Top 5 cyber attacks of 2020—could they have been prevented?
Read about the biggest cyber attacks of 2020. And learn how you can’t stop every threat, but you can mitigate damage with a zero-trust architecture.
Three ways ISE 3.0 enables visibility-driven network segmentation to gain zero trust
ISE 3.0 takes a big leap forward to simplify and ease the deployment of network segmentation, while giving customers the visibility they require to ensure this level of protection doesn’t shut down business objectives. Read our blog to learn more.
Canadian Bacon – Zero to Hero when it comes to Zero-Trust
Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.
Visualize, validate policy and increase remote worker telemetry with Network Analytics Release 7.3.1
How can we simplify remote access, provide resiliency for telemetry sources, reduce organizational risk AND provide the visibility into policy required to embrace zero trust and network segmentation? Read the Cisco Secure Network Analytics Release 7.3.1 blog to find out.
The Darkness and the Light
Reduce your business risk by securing your workloads. Be vigilant in monitoring and revisiting the basics often. By questioning everything, and focusing on the basics, you will achieve better security.
Introducing the New “Cisco Security Outcomes Study”
Our latest Cisco 2021 Security Outcomes Study analyzes 25 security practices to determine which are most impactful for strengthening organizational defenses. Find out how you can up-level your security program in the new year.
ISE 3.0 Dynamic Visibility: Step into zero trust for the workplace
Identity Service Engine (ISE) 3.0 brought us dynamic visibility — the first step to continual access and authorization based on least privilege. We can now build secure network access that keeps up with users and threats to gain zero trust within the workplace.
Zero Trust for Workloads: Knowledge is Key
Security controls must be driven down to the application workload level to be effective. Learn a comprehensive zero trust method to accomplish that.
Accelerating your cybersecurity program: Why, when, and how to do it
Cybersecurity is considered the most significant skills shortage in IT today. In response, organizations are turning to managed security service providers to accelerate their cybersecurity goals. Discover what to look for when choosing a security service provider and how you can establish the right partnership.