Better design for simpler, more effective security

By David Sward Few will contest the notion that security is complex. Evolving threats. Clever, motivated attackers. And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of

Source:: Cisco Security Notice

2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI

By Kevin Skahill With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest

Source:: Cisco Security Notice

2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI

By Kevin Skahill With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest

Source:: Cisco Security Notice

Cisco and IBM: Partnering for Better Security

By Demetris Booth Considering the spate of cyber threats faced by customers, the need to more easily prioritize these threats, understand the scope and veracity of the attacks, and subsequently automate the responses,

Source:: Cisco Security Notice

Cisco and IBM: Partnering for Better Security

By Demetris Booth Considering the spate of cyber threats faced by customers, the need to more easily prioritize these threats, understand the scope and veracity of the attacks, and subsequently automate the responses,

Source:: Cisco Security Notice

2017 in Snort Signatures.

By Talos Group 2017 was an eventful year for cyber security with high profile vulnerabilities that allowed self-replicating worm attacks such as WannaCry and BadRabbit to impact

Source:: Cisco Security Notice

2017 in Snort Signatures.

By Talos Group 2017 was an eventful year for cyber security with high profile vulnerabilities that allowed self-replicating worm attacks such as WannaCry and BadRabbit to impact

Source:: Cisco Security Notice

Securing the IIoT: Your Opportunity to be a Cyber Hero

By Tom Gilheany There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT).

Source:: Cisco Security Notice

Securing the IIoT: Your Opportunity to be a Cyber Hero

By Tom Gilheany There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT).

Source:: Cisco Security Notice

Demystifying the API (Using Threat Grid as an Example)

By Ben Greenbaum Let’s talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an

Source:: Cisco Security Notice