FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdaySecurity – Cisco Blog

Black Hat Europe 2024 NOC/SOC: Security Cloud

Cisco is the Official Security Cloud Provider for the Black Hat Network Operations Center (NOC). We work with the other official partners to bring the hardware, software and engineers to build and secure the network, for our joint customer: Black Hat.Β  Arista: Wired and Wireless Network EquipmentΒ  Corelight: Open Network Detection and ResponseΒ  Palo Alto […]

The Impacts of Government Regulations on PQC Product Availability

U.S. government regulation has an impact on PQC availability, with different certified encryption methods being required for products handling government info.

GenAI to Advanced Microsegmentation: Secure Workload 3.10 Has It All!

Secure Workload platform has taken a significant leap forward with the launch of its 3.10 release earlier this month packed with Gen AI and many more.

The Customer Adoption Journey of Cisco Secure Workload

Explore the customer adoption journey of Cisco Secure Workload, with key stages and best practices for successful implementation highlighted.

Cisco Secure Workload: Leading in Segmentation Maturity

As cyber threats evolve, defending workloads in today’s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality demands a shift from just keeping threats out to minimizing their impact when they breach. Cisco Secure Workload is at the […]

Quantum Cryptography: What’s Coming Next

NIST developed new quantum-resistant cryptographic standards, but operationalizing these standards will require more work.

Business Leader’s Guide for a Successful Microsegmentation Project

One of the most effective strategies for protecting your digital assets is microsegmentation. The success lies in how it's implemented and the planning.

The Countdown Has Begun: Getting Started on Your Post-Quantum Journey

Using existing encryption and key management technologies, enterprises can realize quantum-safe encryption today without waiting for implementations.

Black Hat 2024: SOC in the NOC

The Black Hat Network Operations Center (NOC) provides a high-security, high-availability network in one of the most demanding environments in the world: the Black Hat event. The NOC partners are selected by Black Hat, with Arista, Cisco, Corelight, Lumen, NetWitness and Palo Alto Networks delivering from Las Vegas this year. Cisco is the official Domain […]

Forrester Named Cisco a Leader in the 2024 Microsegmentation Wave

We believe Cisco is the only leader in the Forrester Wave that offers complete network security. Learn how Cisco microsegments everything.

Building a Resilient Network and Workload Security Architecture from the Ground Up

As part of building a resilient architecture, it is essential to include and plan for scenarios in which the endpoint or workload solution might fail.

Cisco Innovating a New Era of Security at Black Hat 2024

It’s almost time for another year of cutting-edge research and innovative talks, as thousands of hackers and security professionals descend upon Las Vegas for Black Hat 2024.

User Protection Suite Secures Against Talos Top Ransomware Attack Trends

Discover Talo’s first episode of Talos Threat Perspective and how Cisco’s User Protection Suite can provide a layered approach to security.

Cisco Secure Access Wins Global Security Service Edge Customer Value Leadership Award

It’s one thing to claim leadership in cloud security; it’s another to have that leadership acknowledged by industry experts. That’s why we’re thrilled to announce our recent recognition by Frost & Sul… Read more on Cisco Blogs

Cisco Secure Workload 3.9 Delivers Stronger Security and Greater Operational Efficiency

The proliferation of applications across hybrid and multicloud environments continues at a blistering pace. For the most part, there is no fixed perimeter, applications and environments are woven… Read more on Cisco Blogs

❌