Cisco and Nvidia: Redefining Workload Security
Cisco Blog » Security
by Jana Radhakrishnan
1w ago
There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access… Read more on Cisco Blogs ..read more
Visit website
Cisco Secure Access named Leader in Zero Trust Network Access
Cisco Blog » Security
by Andrew Akers
1w ago
Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today’s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust a… Read more on Cisco Blogs ..read more
Visit website
Sign up for a Tour at the RSA Conference 2024 SOC
Cisco Blog » Security
by Jessica Bair
1w ago
Join the guided tour outside the Security Operations Center, where we’ll discuss real time network traffic of the RSA Conference, as seen in the NetWitness platform. Engineers will be using Cisco S… Read more on Cisco Blogs ..read more
Visit website
Complexity drives more than security risk. Secure Access can help with that too.
Cisco Blog » Security
by Andrew Akers
2w ago
Modern networks are complex, often involving hybrid work models and a mix of first- and third-party applications and infrastructure. In response, organizations have adopted security service edge… Read more on Cisco Blogs ..read more
Visit website
Helping Ivanti VPN Customers
Cisco Blog » Security
by Bill Mabon
2w ago
In January 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a directive (with an update in February) mandating that all U.S. Federal agencies take Ivanti systems offline… Read more on Cisco Blogs ..read more
Visit website
Cisco Secure Workload 3.9 Delivers Stronger Security and Greater Operational Efficiency
Cisco Blog » Security
by Brijeshkumar Shah
3w ago
The proliferation of applications across hybrid and multicloud environments continues at a blistering pace. For the most part, there is no fixed perimeter, applications and environments are woven… Read more on Cisco Blogs ..read more
Visit website
Mitigating Lateral Movement with Zero Trust Access
Cisco Blog » Security
by Andrew Akers
3w ago
Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their… Read more on Cisco Blogs ..read more
Visit website
Cisco Live Melbourne SOC Report
Cisco Blog » Security
by Christian Clasen
1M ago
Executive Summary. 1 The Team… 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC… Read more on Cisco Blogs ..read more
Visit website
Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management
Cisco Blog » Security
by Ahmadreza Edalat
1M ago
Co-authored by Tejas Sheth, Sr. Security Specialist, Amazon Web Services – AISPL. Risk-based Vulnerability Management (RBVM) represents a strategic approach to cyber security that focuses on… Read more on Cisco Blogs ..read more
Visit website
Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE
Cisco Blog » Security
by Bill Mabon
1M ago
By shifting from point-solutions to a cybersecurity platform approach, IT and security teams significantly improve their efficiency and security outcomes. Security Service Edge (SSE) projects are… Read more on Cisco Blogs ..read more
Visit website

Follow Cisco Blog » Security on FeedSpot

Continue with Google
Continue with Apple
OR