Navigating the new normal Organizations are currently facing new challenges related to monitoring and securing their remote workforces. Many users don’t always use their VPNs while working remotely – this creates gaps in visibility that increase organizational risks. In the past, many organizations viewed these occasional gaps in visibility as negligible risks due to low … [Read more...] about Complete and continuous remote worker visibility with Network Visibility Module data as a primary telemetry source
Continuous
Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2
We are very excited to announce new Secure Network Analytics features! With release 7.3.2, we have furthered our efforts to extend the zero-trust workplace to anywhere on any device through significant enhancements to Secure Network Analytics’ ability to provide complete and continuous remote worker visibility and have also expanded data collection from integrated Cisco Secure … [Read more...] about Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2
The Need for Continuous and Dynamic Threat Modeling
This blog is co-authored by Mohammad Iqbal and is part four of a four-part series about DevSecOps. The trend towards accelerated application development, and regular updates to an architecture through an agile methodology, reduces the efficacy and effectiveness of point-in-time threat modeling. This recognition led us to explore and strategize ways to continuously, and … [Read more...] about The Need for Continuous and Dynamic Threat Modeling
A Framework for Continuous Security
This is part one of a four-part blog series about DevSecOps. Technology is at the core of business today. Maintaining the resiliency of critical data, assets, systems, and the network is mission-critical; crucial to meeting business goals. As a result, development operations (DevOps) professionals must continuously improve the overall resilience —along with the security posture … [Read more...] about A Framework for Continuous Security
A Look Into Continuous Efforts By Chinese Hackers to Target Foreign Governments
Phishing is still one of the widely used strategies by cybercriminals and espionage groups to gain an initial foothold on the targeted systems.Though hacking someone with phishing attacks was easy a decade ago, the evolution of threat detection technologies and cyber awareness among people has slowed down the success of phishing and social engineering attacks over the … [Read more...] about A Look Into Continuous Efforts By Chinese Hackers to Target Foreign Governments