Category: Security – Cisco Blogs

Preparing for Critical Infrastructure Changes in Australia

This article has been indexed from Security – Cisco Blogs Critical infrastructure regulations are changing in Australia This blog outlines some insights as to what is coming for cyber resilience. Read the original article: Preparing for Critical Infrastructure Changes in…

TrustSec Policy Analytics – Part Three: Policy Validation

This article has been indexed from Security – Cisco Blogs TrustSec Policy Analytics – Part Three delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics…

SecureX threat response Turnkey Integrations

This article has been indexed from Security – Cisco Blogs Now, all integrations in SecureX are turnkey/out-of-the-box. No configuration is required, just enter your API key, for all Cisco Secure and 3rd party security products. Read the original article: SecureX…

Back to the Future of Firewall

This article has been indexed from Security – Cisco Blogs Network firewall is not dead, but it must evolve to combat the insertion and visibility challenges. Grab an early look into this product transformation. Read the original article: Back to…

Why Every Midsize Business Needs a Security Strategy

This article has been indexed from Security – Cisco Blogs Cisco recently released the 2021 Security Outcomes Study for SMBs, focusing on how small and midsize companies are investing in security to meet priorities. Read the original article: Why Every…

TrustSec Policy Analytics – Part Two: Policy Visualization

This article has been indexed from Security – Cisco Blogs TrustSec Policy Analytics – Part Two delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics…

Meet the Cisco Telemetry Broker Team: Ajit Thyagarajan

This article has been indexed from Security – Cisco Blogs TK Keanini’s next interview in the Meet the Cisco Telemetry Broker Team features Ajit Thyagarajan, discussing the future of the Cisco Telemetry Broker. Read the original article: Meet the Cisco…

Snort 3: Rearchitected for Simplicity and Performance

This article has been indexed from Security – Cisco Blogs Snort has become the standard by which all network intrusion detection systems are measured. Snort 3, released in January 2021 is a significant upgrade. Read the original article: Snort 3:…

Cisco Secure Firewall insertion using Cisco cAPIC in Azure

This article has been indexed from Security – Cisco Blogs Cisco cAPIC runs on Azure and provides automated policy and visibility of workloads. Secure Firewall Threat Defense integrates with the cloud ACI environment using a service graph, providing threat protection.…

Secure Workload and Secure Firewall – Unified Segmentation

This article has been indexed from Security – Cisco Blogs Firewalls must keep pace with today’s dynamic applications. Now, Cisco NetWORK redefines network security, empowering NetOps to run at DevOps speed. Automated dynamic policies integrate network and workload-level control, securing…

Going on-premise with SecureX orchestration remote

This article has been indexed from Security – Cisco Blogs Introducing SecureX Orchestration Remote. This new feature allows you to start integrating on-premise resources into your orchestration workflows. Learn the value and how to get started. Read the original article:…

Scalable Security with Cisco Secure Firewall Cloud Native

This article has been indexed from Security – Cisco Blogs Dive deeper into how Cisco Secure Firewall Cloud Native gives you the flexibility to provision, run, and scale containerized security services. Read the original article: Scalable Security with Cisco Secure…

TrustSec Policy Analytics – Part One: What are policy analytics?

This article has been indexed from Security – Cisco Blogs Cisco Secure Network Analytics’ new TrustSec Analytics reports enable users to visualize group communications, validate policies, streamline policy violation investigations, and accelerate policy adoption efforts Read the original article: TrustSec…

Key Takeaway from the Colonial Pipeline Attack

This article has been indexed from Security – Cisco Blogs The recent cyber-attack on the Colonial Pipeline had a major impact on the life of millions of Americans. What can we learn from it to start properly securing critical infrastructures?…

Exposing hidden cyber supply chain risks

This article has been indexed from Security – Cisco Blogs This blog covers cyber supply chain risks, including the software and island hopping attacks. Register for the Supply Chain Summit on May 26. Read the original article: Exposing hidden cyber…

Dealing with stress, burnout and mental health

This article has been indexed from Security – Cisco Blogs A discussion on mental health in the threat intelligence industry and the mental toll of threat hunting, fear of repercussion and failure. Read the original article: Dealing with stress, burnout…

Introducing Device Insights for Cisco SecureX

This article has been indexed from Security – Cisco Blogs Introducing Cisco SecureX device insights. Learn how this feature can provide your organization with a comprehensive endpoint inventory within SecureX. Read the original article: Introducing Device Insights for Cisco SecureX

NetWORK: Redefining Network Security

This article has been indexed from Security – Cisco Blogs It’s a new day for network security. Major Secure Firewall announcements: announcing Secure Firewall Threat Defense 7.0 and our NetWORK security vision. Read the original article: NetWORK: Redefining Network Security

Reflecting on a Year of Cisco SecureX

This article has been indexed from Security – Cisco Blogs At RSA Conference, we reflect on a year of Cisco SecureX a cloud-native, built-in platform that connects our Security portfolio and your infrastructure. Read the original article: Reflecting on a…

Pipeline Security Tunnel Vision

This article has been indexed from Security – Cisco Blogs A lot of hype has been associated with pipeline cybersecurity. Often, claims are overwrought. Practitioners should mainly focus on security practices. Read the original article: Pipeline Security Tunnel Vision

Delivering simplified cybersecurity to small businesses

This article has been indexed from Security – Cisco Blogs Small businesses have become targets for cybercriminals. Find out how Cisco cybersecurity works with service providers to protect SMBs from cyber threats. Read the original article: Delivering simplified cybersecurity to…

New Firepower Forensic Guides Announced

Blog announces the publication of 2 new Firepower related forensic guides now available on the cisco.com security portal. Read the original article: New Firepower Forensic Guides Announced

Threat Explainer: Supply Chain Attacks

In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them. Read the original article: Threat Explainer: Supply Chain Attacks

Your network is talking. Are you listening?

Take a look at the spark of innovation within Cisco security analytics and how we can use visibility, telemetry, and analytics to listen to the network to detect threats. Read the original article: Your network is talking. Are you listening?

Cisco wins SC Media Award for “Best Security Company”

SC Media has named Cisco the “Best Security Company” as part of its 2021 SC Awards. Cisco also won “Best Small and Medium Enterprise (SME) Security Solution and “Best Network Access Control (NAC) Solution” Read the original article: Cisco wins SC Media…

8 Reasons why you should pick Cisco Viptela SD-WAN

Read the original article: 8 Reasons why you should pick Cisco Viptela SD-WAN This blog examines the evolution of WAN into the world of Multi-Cloud and explains the many reasons why Cisco Viptela SDWAN should be considered as the optimal…

8 Reasons why you should pick Cisco Viptela SDWAN

Read the original article: 8 Reasons why you should pick Cisco Viptela SDWAN This blog examines the evolution of WAN into the world of Multi-Cloud and explains the many reasons why Cisco Viptela SDWAN should be considered as the optimal…

How CISOs Can Impact Security for All

Read the original article: How CISOs Can Impact Security for All Our new Advisory CISO, Helen Patton, has many years of experience under her belt. I recently connected with her to discuss how CISOs can help improve global security overall.…

The Need for Continuous and Dynamic Threat Modeling

Read the original article: The Need for Continuous and Dynamic Threat Modeling The trend towards accelerated application development, regularly updating the architecture through an agile methodology, led us to strategize ways to continuously, and dynamically, threat model an application architecture…

Meet the Cisco Telemetry Broker Team: Sunil Amin

Read the original article: Meet the Cisco Telemetry Broker Team: Sunil Amin TK Keanini’s first in a series of interviews with members of the Cisco Telemetry Broker team. Sunil Amin, Principal Engineer, talks about what went into creating the product.…

Industry Recognition for Cisco Secure Email Cloud Mailbox

Read the original article: Industry Recognition for Cisco Secure Email Cloud Mailbox A look at the many reasons that customers and industry leaders and applauding Cloud Mailbox. Read the original article: Industry Recognition for Cisco Secure Email Cloud Mailbox

How Cybersecurity Found Me: My Career Journey

Read the original article: How Cybersecurity Found Me: My Career Journey Ben Holladay shares his career journey from consulting into cybersecurity sales and advice for building your career through finding mentors, building skills, and staying true to your values. Read…

Securing AWS EKS Environments

Read the original article: Securing AWS EKS Environments Today’s dynamic multi-cloud application environments change rapidly — on a daily, or even hourly, basis. How can you ensure manageable, efficient security without compromising agility? Learn how Cisco #SecureWorkload can help. Read…

The Rise of Telemetry Architecture

Read the original article: The Rise of Telemetry Architecture If your business is based on analytics for its success, then it is also dependent on quality telemetry being available to improve those analytics. Learn how Cisco Telemetry Broker can help…

Test Automation for Application Security

Read the original article: Test Automation for Application Security After an application is developed, multiple security tests must be run to ensure it’s ready for deployment. Learn how Cisco validates its software based on industry and internal security standards.  …

What does it take to do SASE your way?

Read the original article: What does it take to do SASE your way? Cisco SecureX is bringing radical simplification to security. Learn how our integrated, cloud-native platform can help you transform your network for a seamless transition to SASE.  …

Threat Roundup for March 19 to March 26

Read the original article: Threat Roundup for March 19 to March 26 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 19 and March 26. As with previous roundups, this post isn’t meant to…

Threat Trends: DNS Security, Part 2

Read the original article: Threat Trends: DNS Security, Part 2 A deep dive into industry-specific threat trends surrounding malicious DNS activity.   Become a supporter of IT Security News and help us remove the ads. Read the original article: Threat…

Threat Roundup for March 12 to March 19

Read the original article: Threat Roundup for March 12 to March 19 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 12 and March 19. As with previous roundups, this post isn’t meant to…

Introducing The Cisco Telemetry Broker

Read the original article: Introducing The Cisco Telemetry Broker Introducing, The Cisco Telemetry Broker! Learn how you can optimize the consumption of telemetry data for your business-critical tools by brokering, filtering, and transforming your data.   Become a supporter of…

The three C’s approach to SASE

Read the original article: The three C’s approach to SASE SASE is a network architecture that combines SD-WAN capabilities with cloud-native security functions. SASE helps organizations to simplify and scale secure connectivity for a distributed workforce. Yet, transitioning existing network…

MITRE ATT&CK: The Magic of Application Mitigations

Read the original article: MITRE ATT&CK: The Magic of Application Mitigations This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.   Become a…

Future Focused: Encryption and Visibility Can Co-Exist

Read the original article: Future Focused: Encryption and Visibility Can Co-Exist Privacy and security are in constant tension. Hiding internet activity strengthens privacy—but also makes it easier for bad actors to infiltrate the network.   Become a supporter of IT…

Level up your Secure Email game using SecureX Orchestrator

Read the original article: Level up your Secure Email game using SecureX Orchestrator Cisco Secure Email and Cisco SecureX Orchestration team-up to help the email administrator automate phishing email threats and more by using workflow triggers and actions, advancing your…

Threat Roundup for March 5 to March 12

Read the original article: Threat Roundup for March 5 to March 12 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 5 and March 12. As with previous roundups, this post isn’t meant to…

Securing industrial networks: What is ISA/IEC 62443?

Read the original article: Securing industrial networks: What is ISA/IEC 62443? Securing industrial operations is top of mind. But converting good intentions to action can be challenging! Fortunately, the ISA/IEC 62443 standards provide a framework to move ahead. But what…

Threat Trends: DNS Security, Part 1

Read the original article: Threat Trends: DNS Security, Part 1 An examination of the trends seen in malicious DNS activity during 2020, covering threat categories such as illicit cryptomining, phishing, trojans, ransomware, and others.   Become a supporter of IT…

How to Balance IT Stability and Strong Security

Read the original article: How to Balance IT Stability and Strong Security A proactive tech refresh helps you stay ahead of threats, but how do you balance stability as new products are introduced? Read more on how to successfully achieve…

Threat Roundup for February 26 to March 5

Read the original article: Threat Roundup for February 26 to March 5 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 26 and March 5. As with previous roundups, this post isn’t meant to…

Cisco Secure Email: A Proven and Consistent Leader

Read the original article: Cisco Secure Email: A Proven and Consistent Leader A look at the key features that make Cisco Secure Email a market leader according to the latest Radicati report.   Become a supporter of IT Security News…

Third-Party Software Security Scanning

Read the original article: Third-Party Software Security Scanning Third-party software is ubiquitous across product development. With it grows the interest for more accurate visibility, accounting of open source and commercial components, and for proper management and hygiene.   Become a…

Threat Roundup for February 19 to February 26

Read the original article: Threat Roundup for February 19 to February 26 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 19 and February 26. As with previous roundups, this post isn’t meant to…

How Does Triton Attack Triconex Industrial Safety Systems?

Read the original article: How Does Triton Attack Triconex Industrial Safety Systems? In this technical report, Cisco’s IoT Security Lab describes one of the most famous attacks on Triconex industrial systems. Learn how your industrial operations could be exposed.  …

Simplified Security for a Successful Digital Transformation

Read the original article: Simplified Security for a Successful Digital Transformation The world has changed significantly in the past year. Organizations must now keep up with even greater demands for ubiquitous connectivity. Learn how you can strengthen and streamline your…

Threat Roundup for February 12 to February 19

Read the original article: Threat Roundup for February 12 to February 19 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 12 and February 19. As with previous roundups, this post isn’t meant to…

2021 Security Outcomes Study: Stress Relief for CISOs

Read the original article: 2021 Security Outcomes Study: Stress Relief for CISOs To assist CISOs in managing emerging challenges, Cisco’s Security Outcomes Study points the way towards observing and actions that can be used to build the cybersecurity platform of…

Threat Roundup for February 5 to February 12

Read the original article: Threat Roundup for February 5 to February 12 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 5 and February 12. As with previous roundups, this post isn’t meant to…