Protecting Data Globally: A Modern Mandate

By Michelle Fleury Data is the currency of the knowledge economy. This makes it a highly valuable commodity – for organizations and cybercriminals alike. As threats to data security mount, organizations must find ways to keep their critical digital assets safe at all touch points and compliant to international data protection regulations that vary by country. A tall order, to be sure. Yet protecting data is a mandate in today’s global economy. With customers all over the world, organizations need to be able []

Source:: Cisco Security Notice

Introducing Cisco Firepower 4100 Series Next-Generation Firewall

By Scott Harrell Enable Digital Business with the Industry’s First Fully-Integrated, Threat-Focused NGFW Today’s world is undergoing digital disruption that will spark more connectivity than ever before, as consumers, businesses and governments leverage digitization to drive innovation forward. Yet, the more connected we become, the more opportunities we create for cybercriminals. In order for enterprises to operate effectively in today’s environment, they have to focus their security efforts on stopping advanced threats in the current dynamic threat landscape. IT teams have been asked []

Source:: Cisco Security Notice

Introducing Cisco Firepower 4100 Series Next-Generation Firewall

By Scott Harrell Enable Digital Business with the Industry’s First Fully-Integrated, Threat-Focused NGFW Today’s world is undergoing digital disruption that will spark more connectivity than ever before, as consumers, businesses and governments leverage digitization to drive innovation forward. Yet, the more connected we become, the more opportunities we create for cybercriminals. In order for enterprises to operate effectively in today’s environment, they have to focus their security efforts on stopping advanced threats in the current dynamic threat landscape. IT teams have been asked []

Source:: Cisco Security Notice

Take a Strategic Approach to Security Segmentation

By Ann Swenson [This post was written by Pavan Reddy, Customer Solutions Director, Cisco Security Services] You’ve read the stats : by the end of the decade, the Internet of Everything will result in 50 billion networked connections of people, process data and things. You don’t need to look far to see it come to life in your own organization. With increased digitization comes an exploding number of devices and applications gaining access to your network, creating more data to secure and new attack []

Source:: Cisco Security Notice

Take a Strategic Approach to Security Segmentation

By Ann Swenson [This post was written by Pavan Reddy, Customer Solutions Director, Cisco Security Services] You’ve read the stats : by the end of the decade, the Internet of Everything will result in 50 billion networked connections of people, process data and things. You don’t need to look far to see it come to life in your own organization. With increased digitization comes an exploding number of devices and applications gaining access to your network, creating more data to secure and new attack []

Source:: Cisco Security Notice

DNSChanger Outbreak Linked to Adware Install Base

By Veronica Valeros [Ed. note: This post was authored by Veronica Valeros , Ross Gibb , Eric Hulse, and Martin Rehak ] Late last autumn, the detector described in one of our previous posts, Cognitive Research: Learning Detectors of Malicious Network Traffic , started to pick up a handful of infected hosts exhibiting a new kind of malware behavior. Initially, the number of infections were quite low, and nothing had drawn particular attention to the findings. Recently, this changed when we observed a significant uptake in the number of infections during the first few weeks of 2016. These []

Source:: Cisco Security Notice

DNSChanger Outbreak Linked to Adware Install Base

By Veronica Valeros [Ed. note: This post was authored by Veronica Valeros , Ross Gibb , Eric Hulse, and Martin Rehak ] Late last autumn, the detector described in one of our previous posts, Cognitive Research: Learning Detectors of Malicious Network Traffic , started to pick up a handful of infected hosts exhibiting a new kind of malware behavior. Initially, the number of infections were quite low, and nothing had drawn particular attention to the findings. Recently, this changed when we observed a significant uptake in the number of infections during the first few weeks of 2016. These []

Source:: Cisco Security Notice

Built-In Security: Sharing the ‘How’

By Anthony Grieco I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent post , the Security and Trust team is headed to CiscoLive Berlin with the goal of sharing real and actionable security practices that are designed to be taken []

Source:: Cisco Security Notice

Built-In Security: Sharing the ‘How’

By Anthony Grieco I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent post , the Security and Trust team is headed to CiscoLive Berlin with the goal of sharing real and actionable security practices that are designed to be taken []

Source:: Cisco Security Notice

Small to Midsize Business Security Capabilities Falling as Attack Sophistication Rises

By John Damon Working with limited resources and being asked to “do more with less” is often par for the course for small and midsize businesses (SMBs). Smaller companies are also credited with being more nimble than their enterprise counterparts, adopting next-generation tools more quickly and experimenting with new business models. However, a new survey of CSOs and SecOps Managers reveals that more SMBs are putting themselves at increased risk for cyber attacks by forgoing critical security capabilities and processes. Attackers are Developing []

Source:: Cisco Security Notice