Cisco Blog » Security - RSS Feed

Latest articles

IT Security Execs XDR Survey: ROI Proof Points

Determining the ROI of XDR For many years, defining the return on investment (ROI) for a cybersecurity project, including the ROI of Extended Detection and Response (XDR), was challenging. It was not easy to describe the actual value of many of the protections that were implemented in an organization. Too often, the explanation about how a product...

There is no substitute for a CISO…or is there?

You haven’t had an uninterrupted vacation in years, your presentation at the last board meeting fell short, and it’s hard for you to imagine how the organization would function without you at the helm.  These are all very real situations for today’s CISO.  With the shortage of resources, it has never been harder to resource all the functions of an effective...

How to drive a successful, proactive tech refresh

One of the five main findings in our newly published Security Outcomes Study, Volume 2, was the clear benefit in having a proactive strategy of refreshing business-critical technologies. So, what exactly does this mean — and why are we focusing on it here? In Part 1 of this five-part blog series focusing on each of the top five security practices outlined...

Top 5 Key Takeaways 2021 CISO Survival Guide

Cisco Investments has always been a forward-looking organization. We spend a great deal of time working to understand the evolving nature of current and future security threats, while fostering mutually beneficial relationships with the people and organizations that seek to counter those threats. In 2021, we gathered insights from CISOs and leading...

Nine Top of Mind Issues for CISOs Going Into 2022

It is that time of year when we inevitably reflect on the last 12 months, make a list of resolutions to solidify exactly what our priorities should be going forward and how best we can achieve them. In ‘ordinary’ times, you could mingle with your peers at industry conferences and events, swapping stories and trading information, but as we are all too...

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

This blog has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall. As analysts, we can articulate the technical benefits....

Defending Against Log4j Exploits with Cisco Secure Endpoint

The Apache Log4j vulnerability (CVE-2021-44228) is on the mind of nearly every cybersecurity and IT team right now because of its widespread usage, ease of exploitation, and broad attack surface. This blog provides an overview of how Cisco Secure Endpoint helps protect your environment from attackers exploiting this vulnerability. What You Need to...

How to Respond to Apache Log4j using Cisco Secure Analytics

IT and Security professionals worldwide are working to assess and mitigate their exposure to Apache Log4j vulnerability (CVE-2021-44228). The following guide has been put together for current Secure Network Analytics and Secure Cloud Analytics customers, providing suggested ways to leverage your deployment to assist in your detection and response efforts....

Relevant and Extended Detection with SecureX, Part Two: Endpoint Detections

In part one of this series we introduced the notion of risk-based extended detection with SecureX – the idea that a user can prioritise detections into incidents based on their idea of what constitutes risk in their environments and then extend those detections with enrichments from other products. In subsequent posts we are diving deeper into different...

Securing Multicloud Environments with Cisco Secure Firewall Threat Defense on Alkira Cloud

In today’s security climate, NetOps and SecOps teams are witnessing increased attack surface area as applications and workloads move far beyond the boundaries of their data center. These applications/workloads move to, and reside in, multicloud architecture, adding complexity to connectivity, visibility, and control. In the multicloud world, the SecOps...

Discover, share and read the best on the web

Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!