Today we honor the Cybersecurity Defender of the Year in EMEA for his passionate acts of advocacy. The robust involvement of all of the Cybersecurity Insider Advocates made the selection process extremely difficult and we are happy to have such…
Category: Security – Cisco Blogs
Smart and Frictionless Zero Trust Access for the Workforce
Providing secure access and a frictionless user experience are typically competing initiatives, but they don’t have to be! Read on to learn why. In our world today, context changes quickly. We work from home, coffee shops and the office. We…
SE Labs 2023 Annual Security Report Names Cisco as Best Next Generation Firewall
Cisco Secure Firewall wins best firewall in the SE Labs Cyber Threat Intelligence Annual Report. This article has been indexed from Security – Cisco Blogs Read the original article: SE Labs 2023 Annual Security Report Names Cisco as Best Next…
All in for Security: Cisco Secure at Cisco Live EMEA 2023
Our Cisco vision for an integrated Security Cloud continues to evolve as we introduce key innovations at Cisco Live EMEA, like Risk-Based Authentication and Business Risk Observability. We also dive into key security trends outlined in our new Security Readiness…
Honoring our ‘Cybersecurity Defender of the Year’ in EMEA
Today we honor the Cybersecurity Defender of the Year in EMEA for his passionate acts of advocacy. The robust involvement of all of the Cybersecurity Insider Advocates made the selection process extremely difficult and we are happy to have such…
All in for Security: Cisco Secure at Cisco Live EMEA 2023
Cisco Live is the premier destination for Cisco customers and partners to gain knowledge and build community. Our teams work hard to deliver education and inspiration, ignite creativity, deliver practical know-how, and accelerate the connections that fuel your digital future.…
The Power of Relationships: Executive Buy-In and Security Culture for Bolstering Resilience
Findings from Cisco’s Security Outcomes Report spotlight the importance of executive buy-in and a security culture in bolstering resilience. This article has been indexed from Security – Cisco Blogs Read the original article: The Power of Relationships: Executive Buy-In and…
Cisco secures IoT, keeping security closer to networking
The use of IoT devices in enterprises is growing exponentially. A critical concern is deploying IoT devices without requisite security controls. Being a leader in both security and networking, Cisco continues to bring security closer to networking. This article has…
Clarity and Transparency: How to Build Trust for Zero Trust
Changing mindsets is as important as changing toolsets when it comes to zero trust – that’s why clarity, transparency, and relationship building come first. This article has been indexed from Security – Cisco Blogs Read the original article: Clarity and…
Building a secure and scalable multi-cloud environment with Cisco Secure Firewall Threat Defense on Alkira Cloud
Cisco has partnered with Alkira to deliver a centralized security model for multi-cloud architecture that is easy to deploy, manage, and increases visibility and control. This article has been indexed from Security – Cisco Blogs Read the original article: Building…
Understanding Business Email Compromise to better protect against it
Understanding business email compromise tactics is the best way to identify the best solution to protect against it. This article has been indexed from Security – Cisco Blogs Read the original article: Understanding Business Email Compromise to better protect against…
10 Surprises of Remote Work from Security Engineers
Learn how security engineers at Cisco navigate the nuances of working remotely and their advice for maximizing collaboration. This article has been indexed from Security – Cisco Blogs Read the original article: 10 Surprises of Remote Work from Security Engineers
Clarity and Transparency: How to Build Trust for Zero Trust
Changing mindsets is as important as changing toolsets when it comes to zero trust – that’s why clarity, transparency, and relationship building come first. This article has been indexed from Security – Cisco Blogs Read the original article: Clarity and…
Building a secure and scalable multi-cloud environment with Cisco Secure Firewall Threat Defense on Alkira Cloud
Cisco has partnered with Alkira to deliver a centralized security model for multi-cloud architecture that is easy to deploy, manage, and increases visibility and control. This article has been indexed from Security – Cisco Blogs Read the original article: Building…
Understanding Business Email Compromise to better protect against it
Understanding business email compromise tactics is the best way to identify the best solution to protect against it. This article has been indexed from Security – Cisco Blogs Read the original article: Understanding Business Email Compromise to better protect against…
10 Surprises of Remote Work from Security Engineers
Learn how security engineers at Cisco navigate the nuances of working remotely and their advice for maximizing collaboration. This article has been indexed from Security – Cisco Blogs Read the original article: 10 Surprises of Remote Work from Security Engineers
The Nominees for the 2023 Cybersecurity Defender of the Year Award in EMEA
Cisco Insider Advocates is announcing its Global Advocate Awards, which recognizes top advocates by region. This article has been indexed from Security – Cisco Blogs Read the original article: The Nominees for the 2023 Cybersecurity Defender of the Year Award…
Privacy’s impact continues to grow, but more remains to be done
Read the Cisco 2023 Data Privacy Benchmark Report to learn how organizations continue to get returns from investments. This article has been indexed from Security – Cisco Blogs Read the original article: Privacy’s impact continues to grow, but more remains…
Encryption is on the Rise!
The migration from TLS 1.2 to 1.3 has some very specific drivers and restraints. Cisco worked with research and consulting firm EMA to survey the market regarding why they have or have not embraced TLS 1.3 at this point. This…
Realizing the Value of Privacy Investment
This CIPL-Cisco research report offers insights into the material business benefits that organizations are realizing from their Data Privacy Management Programs This article has been indexed from Security – Cisco Blogs Read the original article: Realizing the Value of Privacy…
Achieving Security Resilience: Findings from the Security Outcomes Report, Vol 3
Get Europe, Middle East and Africa highlights from the latest cybersecurity report from Cisco, Security Outcomes Report, Vol 3 This article has been indexed from Security – Cisco Blogs Read the original article: Achieving Security Resilience: Findings from the Security…
Nine Top of Mind Issues for CISOs Going Into 2023
Here are the topics that Richard Archdeacon, Advisory CISO at Cisco thinks will be top of mind in 2023, and what CISOs can do to prepare. This article has been indexed from Security – Cisco Blogs Read the original article:…
Accelerate XDR Outcomes with NDR and EDR
This blog post describe how SecureX, Secure Cloud Analytics and Secure Endpoint can be leveraged today to achieve XDR outcomes with incident management, threat investigation and automated response This article has been indexed from Security – Cisco Blogs Read the…
Why Zero Trust Helps Unlock Security Resilience
Findings from Cisco’s Security Outcomes Report spotlight the importance of mature zero trust implementation in building security resilience. This article has been indexed from Security – Cisco Blogs Read the original article: Why Zero Trust Helps Unlock Security Resilience
Black Hat Europe 2022 NOC: The SOC Inside the NOC
Cisco is a Premium Partner of the Black Hat NOC, and is the Official Wired & Wireless Network Equipment, Mobile Device Management, DNS (Domain Name Service) and Malware Analysis Provider. This article has been indexed from Security – Cisco Blogs…
Black Hat Europe 2022 NOC: When planning meets execution
Cisco is a Premium Partner of the Black Hat NOC, and is the Official Wired & Wireless Network Equipment, Mobile Device Management, DNS (Domain Name Service) and Malware Analysis Provider. This article has been indexed from Security – Cisco Blogs…
A Holiday Gift of Savings with Cisco Secure Choice EAs
Give the gift of security resilience and receive instant savings from a secure choice enterprise agreement. This article has been indexed from Security – Cisco Blogs Read the original article: A Holiday Gift of Savings with Cisco Secure Choice EAs
Get Ready: Cisco’s Top Security Trends For 2023 That You Need To Know About
Predictions for Security Trends in 2023 – read the latest Cisco blog, Cisco advisor Richard Archdeacon reviews the latest Gartner trends report and focuses on how businesses should adjust their security posture moving into 2023. This article has been indexed…
Secure Email Threat Defense: Providing critical insight into business risk
Discover the ways that Secure Email Threat Defense uses advanced threat capabilities to identify the intent of an attack and provide insight into business risk. This article has been indexed from Security – Cisco Blogs Read the original article: Secure…
Cisco Secure Cloud Analytics – What’s New
Learn about our efforts to improve NDR. Telemetry, increased detections, and more observations improve Secure Cloud Insights’ interoperability. This article has been indexed from Security – Cisco Blogs Read the original article: Cisco Secure Cloud Analytics – What’s New
Oh, the scammers online are frightful
Scammers are always lurking in the void of the Internet waiting for a chance to fleece the unexpecting from their hard-earned money. This can manifest itself to the unsuspecting in many ways. This article has been indexed from Security –…
Introducing Secure Firewall version 7.3
The 7.3 release includes more features to deliver three key outcomes: see and detect more threats faster in an increasingly encrypted environment, simplify VPN and clustering operations, and lower the TCO of our security solution. This article has been indexed…
The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot
We take a close look into the themes introduced by the Telecommunications (Security) Act & explore how the telecoms industry can apply zero trust to improve its security posture. This article has been indexed from Security – Cisco Blogs Read…
Is your firewall stuck in the 80s?
Today’s workers, data, and applications are everywhere, and firewalls must be as well. Can your firewall keep up, or is it a relic of the past? This article has been indexed from Security – Cisco Blogs Read the original article:…
Cisco Secure Cloud Analytics – What’s New
Learn about our efforts to improve NDR. Telemetry, increased detections, and more observations improve Secure Cloud Insights’ interoperability. This article has been indexed from Security – Cisco Blogs Read the original article: Cisco Secure Cloud Analytics – What’s New
Preparing for 2023 and what lies in store for Endpoint Security
Cisco surveyed 100 IT & security leaders on the Gartner Peer Insights platform to understand their level of security and their view on endpoint security’s future. This article has been indexed from Security – Cisco Blogs Read the original article:…
Explorations in the spam folder–Holiday Edition
We explore spam campaigns during this holiday season, demonstrating what can happen if someone actually clicks on links or open attachments in these unsolicited emails. This article has been indexed from Security – Cisco Blogs Read the original article: Explorations…
Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report
What does security resilience mean and how do you crack the code? Cisco tackles this question in our latest Security Outcomes Report. This article has been indexed from Security – Cisco Blogs Read the original article: Cracking the Code to…
Modernizing the Security of Australia’s Largest Fuel Network
Ampol, Australia’s largest fuel company, is over 120 years old. Read our newest blog to find out how Cisco Secure helped modernize their security environment. This article has been indexed from Security – Cisco Blogs Read the original article: Modernizing…
Rolling Up Our Sleeves: Employee Volunteers Empowered to Give Back
Using paid time to volunteer, Cisco employees contribute to organizations locally and globally from building homes to caring for animals. This article has been indexed from Security – Cisco Blogs Read the original article: Rolling Up Our Sleeves: Employee Volunteers…
Cisco Joins the Launch of Amazon Security Lake
Cisco is a launch partner of the AWS data lake This article has been indexed from Security – Cisco Blogs Read the original article: Cisco Joins the Launch of Amazon Security Lake
ALL IN at Cisco Live 2022 Melbourne: Building Security Resilience for the Modern Enterprise
Cisco Live 2022 Melbourne is back! Be ALL IN with us and discover how you can protect your organization and build security resilience. This article has been indexed from Security – Cisco Blogs Read the original article: ALL IN at…
What’s NEXT with Michael Ebel at Atmosfy
Brief overview of the first episode of Cisco Secure’s video series “NEXT” This article has been indexed from Security – Cisco Blogs Read the original article: What’s NEXT with Michael Ebel at Atmosfy
Adapt and overcome: What the story of the Tardigrade can teach us about resilience
How did the tardigrade adapt to become arguably the most resilient creature on the planet? And what lessons can be applied? New ebook available now This article has been indexed from Security – Cisco Blogs Read the original article: Adapt…
Reducing Friction in SecureX Orchestration
New features in SecureX Orchestration such as SecureX Tokens and the new SSE API Proxy reduce friction and make automation simpler This article has been indexed from Security – Cisco Blogs Read the original article: Reducing Friction in SecureX Orchestration
Undersea Cables and Cyber Physical Risks.
Consider how disruption to submarine cables might adversely affect the security requirements and availability of your network connections. This article has been indexed from Security – Cisco Blogs Read the original article: Undersea Cables and Cyber Physical Risks.
UN’s International Day of Tolerance is a good reminder that workforce diversity should be 365-day goal
Cybersecurity is in critical need for for a more diverse and inclusive workforce. The UN International Day for Tolerance is a great opportunity to observe that. This article has been indexed from Security – Cisco Blogs Read the original article:…
From Austin to Sydney: How to Work From Anywhere
Learn how to embark on your next adventure and work from anywhere with Cisco’s support. This article has been indexed from Security – Cisco Blogs Read the original article: From Austin to Sydney: How to Work From Anywhere
Kenna.VM Premier: Accelerate Vulnerability Management with Cisco Talos Intel and Remediation Analytics
The new Kenna.VM Premier tier, which is designed for mature organizations, includes new zero-day intelligence from Cisco Talos an remediation analytics. This article has been indexed from Security – Cisco Blogs Read the original article: Kenna.VM Premier: Accelerate Vulnerability Management…
Reducing Friction in SecureX Orchestration
New features in SecureX Orchestration such as SecureX Tokens and the new SSE API Proxy reduce friction and make automation simpler This article has been indexed from Security – Cisco Blogs Read the original article: Reducing Friction in SecureX Orchestration
UN’s International Day of Tolerance is a good reminder that workforce diversity should be 365-day goal
Cybersecurity is in critical need for for a more diverse and inclusive workforce. The UN International Day for Tolerance is a great opportunity to observe that. This article has been indexed from Security – Cisco Blogs Read the original article:…
From Austin to Sydney: How to Work From Anywhere
Learn how to embark on your next adventure and work from anywhere with Cisco’s support. This article has been indexed from Security – Cisco Blogs Read the original article: From Austin to Sydney: How to Work From Anywhere
Kenna.VM Premier: Accelerate Vulnerability Management with Cisco Talos Intel and Remediation Analytics
The new Kenna.VM Premier tier, which is designed for mature organizations, includes new zero-day intelligence from Cisco Talos an remediation analytics. This article has been indexed from Security – Cisco Blogs Read the original article: Kenna.VM Premier: Accelerate Vulnerability Management…
Unscrambling Cybersecurity Acronyms – The ABCs of MDR and XDR Security
Deciphering the many security acronyms is hard, making it tough to identify the best fit for you. Read this blog to get an overview of MDR and XDR solutions. This article has been indexed from Security – Cisco Blogs Read…
REPEAT AND REFINE: HOW DO YOU GET TO CARNEGIE HALL? (Pt. 6 of “Why Don’t You Go Dox Yourself?”)
This step-by-step guide makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: REPEAT AND REFINE: HOW DO YOU GET TO CARNEGIE HALL? (Pt. 6 of…
Cisco Secure Endpoint – looking very positive in recent reports!
Forrester Consulting documents how Cisco Secure Endpoint customers realized improved visibility, better detection, faster remediation yielding 287% ROI and payback < 6 months. This article has been indexed from Security – Cisco Blogs Read the original article: Cisco Secure Endpoint…
Cisco Secure Firewall on AWS: Build resilience at scale with stateful firewall clustering
Learn how firewall clustering for Cisco Secure Firewall provides a highly resilient and reliable architecture for securing your AWS cloud environment. This article has been indexed from Security – Cisco Blogs Read the original article: Cisco Secure Firewall on AWS:…
Cisco Secure Endpoint Crushed the AV-Comparative EPR Test
The word is out! Cisco Secure Endpoint’s effectiveness is off the charts in protecting your enterprise environment. This article has been indexed from Security – Cisco Blogs Read the original article: Cisco Secure Endpoint Crushed the AV-Comparative EPR Test
CLEANING UP THE CLUTTER (Pt. 5 of “Why Don’t You Go Dox Yourself?”)
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: CLEANING UP THE CLUTTER (Pt. 5 of “Why Don’t You Go Dox…
Ways You Can See Yourself as a Mentally Stronger Cybersecurity Professional
As we wrapped up October, we also put the final touches on a flurry of activities to celebrate Cyber Security Awareness Month. The tradition of October as National Cybersecurity Awareness Month goes back to 2004 when Congress and the White…
RSA Conference® 2022 Security Operations Center Findings Report
Download the RSA Conference 2022 SOC Findings Report to learn about unencrypted network traffic, DNS security, intrusion detection and other key security topics. This article has been indexed from Security – Cisco Blogs Read the original article: RSA Conference® 2022…
Employee Volunteers Enrich Communities From the Farm to the Theatre and Beyond
Employees use paid time to volunteer in their communities from harvesting at the farm to championing local arts to providing support at a resource fair. This article has been indexed from Security – Cisco Blogs Read the original article: Employee…
Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!
As with any new technology, getting to a completely passwordless authentication state will be a journey for many organizations. Many of our customers have already begun their passwordless journey. This article has been indexed from Security – Cisco Blogs Read…
Partner Summit 2022: Let’s Own the Opportunity to Build a World of Secure, Resilient Organizations
It’s Partner Summit week and, for me, it’s an important reminder that no one company, not even Cisco, can do it alone. Our partners provide diverse perspectives, expertise, and solutions offerings. Each partner plays a key part in delivering the…
What do kickboxing and cybersecurity have in common
The challenges of not knowing where the opponent may direct the next combination of blows can be like the uncertainties of cybersecurity. This article has been indexed from Security – Cisco Blogs Read the original article: What do kickboxing and…
Cisco Secure Workload: Policy-as-Code Is a Win-Win for Everyone
The last few years have proved to be a catalyst for digital transformation for many of our enterprise customers. Application modernization and adopting multicloud are the foundational building blocks for digitizing business. Customers employ CI/CD (continuous integration, continuous delivery) to…
Secure Your Hybrid Workforce Using These SOC Best Practices
Learn how your SOC can better support your hybrid workforce with practical advice from Cisco technical marketing and an expert from our award winning Talos Threat Intelligence group. This article has been indexed from Security – Cisco Blogs Read the…
LOCKING THE BACK DOOR (Pt. 4 of “Why Don’t You Go Dox Yourself?”)
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: LOCKING THE BACK DOOR (Pt. 4 of “Why Don’t You Go Dox…
ThreatWise TV: Exploring Recent Incident Response Trends
This ThreatWise TV episode, we are examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report. This article has been indexed from Security – Cisco Blogs Read the original article: ThreatWise TV: Exploring Recent Incident Response…
Talking IoT Security at the White House
Leaders convened at the White House to discuss security challenges concerning IoT devices and how we can solve them. This article has been indexed from Security – Cisco Blogs Read the original article: Talking IoT Security at the White House
ThreatWise TV: Exploring Recent Incident Response Trends
This ThreatWise TV episode, we are examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report. This article has been indexed from Security – Cisco Blogs Read the original article: ThreatWise TV: Exploring Recent Incident Response…
Ensuring Security in M&A: An Evolution, Not Revolution
Through decades of acquisitions, Cisco has gained the expertise and experience to make M&A seamless and successful by making cybersecurity a priority throughout the integration process. This article has been indexed from Security – Cisco Blogs Read the original article:…
Talking IoT Security at the White House
Leaders convened at the White House to discuss security challenges concerning IoT devices and how we can solve them. This article has been indexed from Security – Cisco Blogs Read the original article: Talking IoT Security at the White House
Ensuring Security in M&A: An Evolution, Not Revolution
Through decades of acquisitions, Cisco has gained the expertise and experience to make M&A seamless and successful by making cybersecurity a priority throughout the integration process. This article has been indexed from Security – Cisco Blogs Read the original article:…
There’s no better time for zero trust
Learn how to implement a holistic zero trust strategy (at your own pace!) that improves security resilience without sacrificing user experience. This article has been indexed from Security – Cisco Blogs Read the original article: There’s no better time for…
How can I help protect my company from phishing attacks?
Discover the ways you can help your organization avoid becoming a target of Business Email Compromise, a particularly dangerous and costly form of phishing. This article has been indexed from Security – Cisco Blogs Read the original article: How can…
RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don’t You Go Dox Yourself?”)
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don’t You Go…
There’s no better time for zero trust
Learn how to implement a holistic zero trust strategy (at your own pace!) that improves security resilience without sacrificing user experience. This article has been indexed from Security – Cisco Blogs Read the original article: There’s no better time for…
RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don’t You Go Dox Yourself?”)
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don’t You Go…
Making Merger and Acquisition Cybersecurity More Manageable
Part of the secret to Cisco’s success is its ability to acquire companies that strengthen its technology portfolio and securely integrate them into the larger organization. This article has been indexed from Security – Cisco Blogs Read the original article:…
RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don’t You Go Dox Yourself?”)
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don’t You Go…
Making Merger and Acquisition Cybersecurity More Manageable
Part of the secret to Cisco’s success is its ability to acquire companies that strengthen its technology portfolio and securely integrate them into the larger organization. This article has been indexed from Security – Cisco Blogs Read the original article:…
COLLECTING OUR BREADCRUMBS (Pt. 2 of “Why Don’t You Go Dox Yourself?”)
This step-by-step guide on doxxing that makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: COLLECTING OUR BREADCRUMBS (Pt. 2 of “Why Don’t You Go…
Introducing “NEXT” by Cisco Secure
We are thrilled to announce “NEXT” by Cisco Secure, our new video series showcasing the future of technology and how to best secure it. This article has been indexed from Security – Cisco Blogs Read the original article: Introducing “NEXT”…
COLLECTING OUR BREADCRUMBS (Pt. 2 of “Why Don’t You Go Dox Yourself?”)
This step-by-step guide on doxxing that makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: COLLECTING OUR BREADCRUMBS (Pt. 2 of “Why Don’t You Go…
Data Transparency and its Impact on Customer Trust
The Cisco 2022 Consumer Privacy Survey explores what organizations can do to earn and build trust with customers who want more transparency and control of data. This article has been indexed from Security – Cisco Blogs Read the original article:…
COLLECTING OUR BREADCRUMBS (Pt. 2 of “Why Don’t You Go Dox Yourself?”)
This step-by-step guide on doxxing that makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: COLLECTING OUR BREADCRUMBS (Pt. 2 of “Why Don’t You Go…
Cybersecurity Re-Launchers: Pivoting into Cybersecurity as a Mid-Career Professional
It is never too late to start a career in cybersecurity. If you are passionate about the topic and are ready to put in the work to acquire the skills and knowledge needed, anyone, regardless of educational background, can break…
When It Comes to M&A, Security Is a Journey
One of the key considerations, when an organization acquires a company, is ensuring that the security posture of their solutions and infrastructure meet the necessary security standards. This article has been indexed from Security – Cisco Blogs Read the original…
Data Transparency and its Impact on Customer Trust
The Cisco 2022 Consumer Privacy Survey explores what organizations can do to earn and build trust with customers who want more transparency and control of data. This article has been indexed from Security – Cisco Blogs Read the original article:…
Cybersecurity Re-Launchers: Pivoting into Cybersecurity as a Mid-Career Professional
It is never too late to start a career in cybersecurity. If you are passionate about the topic and are ready to put in the work to acquire the skills and knowledge needed, anyone, regardless of educational background, can break…
When It Comes to M&A, Security Is a Journey
One of the key considerations, when an organization acquires a company, is ensuring that the security posture of their solutions and infrastructure meet the necessary security standards. This article has been indexed from Security – Cisco Blogs Read the original…
Employee Volunteer Program Supports Youth Globally
Cisco’s employee volunteer program provides employees with paid time to contribute to their communities including supporting youth locally and globally. This article has been indexed from Security – Cisco Blogs Read the original article: Employee Volunteer Program Supports Youth Globally
Why Don’t You Go Dox Yourself?
This step-by-step dox guide makes protecting yourself online easy, accessible, and maybe even fun. This article has been indexed from Security – Cisco Blogs Read the original article: Why Don’t You Go Dox Yourself?
Employee Volunteer Program Supports Youth Globally
Cisco’s employee volunteer program provides employees with paid time to contribute to their communities including supporting youth locally and globally. This article has been indexed from Security – Cisco Blogs Read the original article: Employee Volunteer Program Supports Youth Globally
Demonstrating Trust and Transparency in Mergers and Acquisitions
The importance of demonstrating security transparency and trust during the mergers and acquisition process. This article has been indexed from Security – Cisco Blogs Read the original article: Demonstrating Trust and Transparency in Mergers and Acquisitions
The Upcoming UK Telecoms (Security) Act Part One: What, Why, Who, When and How
The Telecoms Security Requirements (TSRs) are rapidly approaching. Here, we outline what they mean for UK firms, and what they can do to prepare. This article has been indexed from Security – Cisco Blogs Read the original article: The Upcoming…
Defend your organization from ransomware attacks with Cisco Secure Endpoint
Learn how Cisco Secure Endpoint defends your organization from ransomware attacks. This article has been indexed from Security – Cisco Blogs Read the original article: Defend your organization from ransomware attacks with Cisco Secure Endpoint
Threat Trends: Vulnerabilities
Are the most talked about vulnerabilities the same as those that are most widely used in attacks? This article has been indexed from Security – Cisco Blogs Read the original article: Threat Trends: Vulnerabilities
Cyber Insurance and the Attribution Conundrum
Claiming on cyber insurance policies is soon to depend on attack attribution. What does this mean for CISOs and insurers? This article has been indexed from Security – Cisco Blogs Read the original article: Cyber Insurance and the Attribution Conundrum