FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today โ€” February 20th 2025Security โ€“ Cisco Blog

Your Endpoint Is Secure Against AI Supply Chain Attacks

Beginning immediately, all existing users of Cisco Secure Endpoint and Email Threat Protection are protected against malicious AI Supply Chain artifacts.
Before yesterdaySecurity โ€“ Cisco Blog

Meet the Cybersecurity Defender of 2025 for EMEA

Cisco's 2025 EMEA Cybersecurity Defender of the Year award goes to the team at SAP Enterprise Cloud Services, who raised the bar for overall security posture.

Achieve Transformative Network Security With Cisco Hybrid Mesh Firewall

Hybrid Mesh Firewall addresses 3 forces: Fine-grained composition & distribution of apps in data centers, complex modern networks & sophisticated threats.

Quantum Key Distribution and the Path to Post-Quantum Computing

Learn what's available today for quantum-safe solutions, along with the viability of QKD, an emerging tech that spans the gap between the present and future.

Cybersecurity for Businesses of All Sizes: A Blueprint for Protection

Developing a robust cybersecurity practice involves implementing multiple layers of security measures that are interconnected and continually monitored.

AI Cyber Threat Intelligence Roundup: January 2025

AI threat research is a fundamental part of Ciscoโ€™s approach to AI security. Our roundups highlight new findings from both original and third-party sources.

Evaluating Security Risk in DeepSeek and Other Frontier Reasoning Models

The performance of DeepSeek models has made a clear impact, but are these models safe and secure? We use algorithmic AI vulnerability testing to find out.

Top Threat Tactics and How to Address Them

See the key takeaways for the most recent Cisco Talos Incident Response report and learn how you can use Cisco Security products to help defend against these.

Black Hat Europe 2024 NOC/SOC: Security Cloud

Cisco is the Official Security Cloud Provider for the Black Hat Network Operations Center (NOC). We work with the other official partners to bring the hardware, software and engineers to build and secure the network, for our joint customer: Black Hat.ย  Arista: Wired and Wireless Network Equipmentย  Corelight: Open Network Detection and Responseย  Palo Alto [โ€ฆ]

Simplifying Zero Trust Security for the Modern Workplace

Ciscoโ€™s User Protection Suite now includes Identity Services Engine (ISE), enabling organizations to achieve zero trust for the workplace.

Cisco AI Defense: Comprehensive Security for Enterprise AI Adoption

Cisco AI Defense is a single, end-to-end solution that helps your organization understand and mitigate risk on both the user and application levels.

Advancing AI Security and Contributing to CISAโ€™s JCDC AI Effortsย 

Discover how CISA's new AI Security Incident Collaboration Playbook strengthens AI security and resilience.

From Chaos to Clarity: Navigating Threats With Cisco XDR

Cisco XDR transforms cybersecurity with enhanced threat detection and automated responses. Download the Solution Brief for detailed insights and use cases.

The Impacts of Government Regulations on PQC Product Availability

U.S. government regulation has an impact on PQC availability, with different certified encryption methods being required for products handling government info.

GenAI to Advanced Microsegmentation: Secure Workload 3.10 Has It All!

Secure Workload platform has taken a significant leap forward with the launch of its 3.10 release earlier this month packed with Gen AI and many more.

A New Approach to Network Troubleshooting in the Multicloud World

The Cisco and AWS integration is a radically new approach to ensuring the availability of modern apps today's multicloud, hybrid environments.

The Customer Adoption Journey of Cisco Secure Workload

Explore the customer adoption journey of Cisco Secure Workload, with key stages and best practices for successful implementation highlighted.

Cisco Secure Workload: Leading in Segmentation Maturity

As cyber threats evolve, defending workloads in todayโ€™s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality demands a shift from just keeping threats out to minimizing their impact when they breach. Cisco Secure Workload is at the [โ€ฆ]

Quantum Cryptography: Whatโ€™s Coming Next

NIST developed new quantum-resistant cryptographic standards, but operationalizing these standards will require more work.

Happy Third Birthday to Secure MSP Center

MSPs love how Cisco solved the complex challenges facing the MSP community. Exciting things are coming in 2025 to help MSPs streamline and simplify offerings.

Reducing Help Desk Tickets With Ciscoโ€™s User Protection Suite

Learn how Ciscoโ€™s User Protection Suite tools enable users to quickly and securely get to work.

Business Leaderโ€™s Guide for a Successful Microsegmentation Project

One of the most effective strategies for protecting your digital assets is microsegmentation. The success lies in how it's implemented and the planning.

Robust Intelligence, Now Part of Cisco, Recognized as a 2024 Gartnerยฎ Cool Vendorโ„ข for AI Security

Cisco is excited that Robust Intelligence, a recently acquired AI security startup, is mentioned in the 2024 Gartner Cool Vendors for AI Security report.

Converge Your WAN and Security With Cisco Firewall

Cisco Secure Firewall is a comprehensive offering that simplifies threat protection by enforcing consistent security policies across environments.

NetSecOPEN: Cisco Firewall Outperforms Competition in Real-World Testing

TLS adoption has grown rapidly, with nearly 100% of website connections now delivered over HTTPS. Now, firewalls must do more than simply block threatsโ€”they need to provide advanced decryption capabilities to detect hidden dangers, while maintaining performance, all without compromising the speed of business operations. Security shouldnโ€™t come at the cost of performance Many firewalls [โ€ฆ]

Overview of Cybersecurity Regulations in the Middle East Region, Part 1

The Middle East region is quickly emerging as a new, dynamic player in the world of cybersecurity regulations

Trust Through Transparency: Regulationโ€™s Role in Consumer Confidence

The Cisco 2024 Consumer Privacy Survey highlights awareness and attitudes regarding personal data, legislation, Gen AI and data localization requirements.

Quality is Priority Zero, Especially for Security

Security software can be the first line of defense or the last, and the cost of failure is catastrophic. That's why quality is priority zero for Cisco.

Youโ€™ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

Tech components like MASQUE, QUIC and VPP allow Cisco to overcome the limitations of last-gen ZTNA and SSE solutions. Learn how Cisco is rewriting the ZTA story.

Secure Team Collaboration in EKS with Gatekeeper

Gatekeeper is a powerful tool designed to manage and implement policies across your EKS clusters, making cross-functional collaboration secure and efficient

Using Artificial Intelligence to Catch Sneaky Images in Email

Image-based fraud in email can be challenging to detect and prevent. By leveraging AI, security teams can make inboxes more secure.

DevOps Decoded: Prioritizing Security in a Dynamic World

Integrating security into the DevOps lifecycle is essential for building secure, scalable systems. By embedding security early on, teams can mitigate risks, enhance efficiency, and ensure compliance throughout development and deployment.

Introducing Ciscoโ€™s AI Security Best Practice Portal

Cisco's AI Security Portal contains resources to help you secure your AI implementation, whether you're a seasoned professional or new to the field.

The Countdown Has Begun: Getting Started on Your Post-Quantum Journey

Using existing encryption and key management technologies, enterprises can realize quantum-safe encryption today without waiting for implementations.

Why Software Updates Are Important

Keeping your devices secure is crucial, and one of the simplest yet most effective ways to ensure this is by regularly installing software updates.

Open-Source Security Through the Lens of Tidelift

Cisco is excited to build on our existing relationship with Tidelift by making Tidelift's capabilities available to internal developers across Cisco.

Stopping Attacks Early: The Power of Endpoint Telemetry in Cybersecurity

With effective monitoring into endpoint activity, threats to the network can be detected and neutralized before causing extensive damage.

Password Advice for the Rest of Us

Passwords are a problem and itโ€™s hard to make a good one. So what can you do? Make them long, make them random, and maybe use a password manager.

Black Hat 2024: SOC in the NOC

The Black Hat Network Operations Center (NOC) provides a high-security, high-availability network in one of the most demanding environments in the world: the Black Hat event. The NOC partners are selected by Black Hat, with Arista, Cisco, Corelight, Lumen, NetWitness and Palo Alto Networks delivering from Las Vegas this year. Cisco is the official Domain [โ€ฆ]

Forrester Named Cisco a Leader in the 2024 Microsegmentation Wave

We believe Cisco is the only leader in the Forrester Wave that offers complete network security. Learn how Cisco microsegments everything.

Layered Protection for RADIUS With Cisco

Learn how Ciscoโ€™s unique integrations protect RADIUS authentications when connecting to the network.

Synergizing Cybersecurity: The Benefits of Technology Alliances

There are many integrations made available by Cisco Security and their tech partners, improving cybersecurity posture and defenses of mutual customers.

Re-Imagining Zero Trust With an In-Office Experience, Everywhere

Cisco has designed our solution to overcome common obstacles by powering a secure, in-office experience anywhere that builds on Cisco's own zero trust journey.

Secure Network Analytics 7.5.1 Launch

Secure Network Analytics 7.5.1 is now available. This release provides features including expanded firewall log ingestion, custom dashboards, better ISE integration, and much more.

Leveraging Threat Intelligence in Cisco Secure Network Analytics

Cisco Secure Network Analytics provides pervasive network visibility and security analytics for advanced protection across the extended network and cloud. The purpose of this blog is to review two methods of using threat intelligence in Secure Network Analytics. First, we will cover the threat intelligence feed, and then we will look at using your own [โ€ฆ]

Zero touch provisioning with Cisco Firewall Management Center Templates

Cisco FMC 7.6 brings Template support for easy, scalable zero-touch provisioning and SD-WAN setups.

Unifying Cyber Defenses: How Hybrid Mesh Firewalls Shape Modern Security

Hybrid mesh firewall platforms enable security policy enforcement between workloads and users across any network, especially in on prem-first organizations.

Three Reasons for Cisco Umbrella for Government

Cisco Umbrella for Government up-levels government cybersecurity with protection against phishing, malware, ransomware and data loss from cyberattacks.

Enabling Cybersecurity Incident Response

Universities need advanced security architectures for effective incident response. Discover how XDR solutions enhance visibility and resilience in complex tech landscapes.

Seamless Secure Work on a Plane

Learn how Ciscoโ€™s User Protection Suite provides fast and secure connection to applications, even while traveling.
โŒ