Introduction We are proud to announce that Snort 3 is officially available in a container form factor (called “Snort 3 Anywhere”) on AWS Marketplace to be consumed in your Kubernetes cluster either running on AWS or On-prem. It’s yet another way that we are fulfilling our vision to simplify security for networks, workloads, and applications across your multi-cloud world. I am … [Read more...] about Snort 3 Anywhere – Cisco Blogs
Blogs
New Nexus Forensic Guide – Cisco Blogs
Cisco is pleased to announce a new addition to the Forensic Investigation Procedures for First Responders series of documents that will help customers and partners triage Cisco products that are suspected of being tampered with or compromised. These guides provide step-by-step instructions for first responders that can be used to assess platform integrity and collect … [Read more...] about New Nexus Forensic Guide – Cisco Blogs
Diversity Matters in Cybersecurity – Cisco Blogs
It’s as serendipitous as it seems designed that there are two important worldwide recognitions in October: Global Diversity and Cybersecurity Awareness. The intersection is a powerful reminder for the security industry that diversity fuels innovation. The more varied the experiences and thinking of its people, the better the outcomes. We know instinctively that Diversity and … [Read more...] about Diversity Matters in Cybersecurity – Cisco Blogs
Threat Trends: Firewall – Cisco Blogs
These days, protecting the network perimeter is a foregone conclusion. However, there is no longer a monolithic perimeter—there are often multiple perimeters to protect. Unauthorized attempts to cross perimeters are frequent, and the need to defend against threats is critical to protect your assets. In any perimeter defense a key component is firewalls—the proverbial guard … [Read more...] about Threat Trends: Firewall – Cisco Blogs
The New Trust Standard – Cisco Blogs
As we ride the biggest digital wave in history, the internet has become fundamental to how society maintains livelihoods, conducts business, and stays connected. With it, come a constant evolution of risk. Phishing, service disruptions, ransomware, and other attacks hijack data, destroy sources of income, steal identities and invade privacy, derail nations, and change the … [Read more...] about The New Trust Standard – Cisco Blogs
Announcing SecureX Academy – Cisco Blogs
SecureX has changed the way our customers do the work of securing their environments. We have been able to bring together the Cisco Secure portfolio, 3rd party tools and data sources, and a robust platform architecture into which these technologies can be plugged, in a way that saves organizations time and money and increases their security, using just the free SecureX … [Read more...] about Announcing SecureX Academy – Cisco Blogs
NetWORK: Redefining Network Security – Cisco Blogs
I’ve been fortunate to be part of a few great teams and products. Among the most consequential is Secure Firewall Threat Defense 7.0, announced today at the RSA Conference. We’ve increased throughput by up to 30%—across enabled AVC, IPS, and VPN services—for the majority of Cisco Secure Firewalls. And those massive performance gains are simply the beginning of the story. … [Read more...] about NetWORK: Redefining Network Security – Cisco Blogs
Pipeline Security Tunnel Vision – Cisco Blogs
Few security topics have elicited as much mythology as pipeline security incidents. Perhaps it is the nature of the esoteric equipment involved, the stories of explosions in the tundra, international intrigue, or just the fact that the scale of what could happen, and its impact, is so broad. I happen to live along the path between the Permian Basin (the US’s largest petroleum … [Read more...] about Pipeline Security Tunnel Vision – Cisco Blogs
Securing AWS EKS Environments – Cisco Blogs
So, your organization’s simplifying Kubernetes management with AWS’s Elastic Kubernetes Service (EKS). Now, how are you going to secure that cluster? Whether your role is on the application team, or in DevOps or SecOps, you might be thinking: We chose EKS because agility is important to us. Similarly, we need manageable and efficient security, so we can stay focused on what … [Read more...] about Securing AWS EKS Environments – Cisco Blogs
Third-Party Software Security Scanning – Cisco Blogs
This blog is co-authored by Nur Hayat and is part two of a four-part series about DevSecOps. Earlier in this series we covered how Continuous Security Buddy (CSB) for continuous integration/continuous delivery (CI/CD) — CSB for CI/CD — provides an automation framework for holistic, continuous security based on DevSecOps principles. In this blog, let’s take a closer look at … [Read more...] about Third-Party Software Security Scanning – Cisco Blogs