Cisco Investments has always been a forward-looking organization. We spend a great deal of time working to understand the evolving nature of current and future security threats, while fostering mutually beneficial relationships with the people and organizations that seek to counter those threats. In 2021, we gathered insights from CISOs and leading industry executives, … [Read more...] about Top 5 Key Takeaways 2021 CISO Survival Guide
guide
A Quick Guide for SaaS Security Compliance
When I want to know the most recently published best practices in cyber security, I visit The National Institute of Standards and Technology (NIST). From the latest password requirements (NIST 800-63) to IoT security for manufacturers (NISTIR 8259), NIST is always the starting point. NIST plays a key role as a US standard-setter, due to the organization's professionalism and … [Read more...] about A Quick Guide for SaaS Security Compliance
CrowdStrike Services Launches Log4j Quick Reference Guide (QRG)
The Log4j vulnerability burst onto the scene just a few weeks ago, but to many defenders it already feels like a lifetime. It has rapidly become one of the top concerns for security teams in 2021, and seems set to remain so for the foreseeable future. The critical details of this threat evolve almost daily, making it a formidable challenge for defenders to keep tabs on the … [Read more...] about CrowdStrike Services Launches Log4j Quick Reference Guide (QRG)
New Nexus Forensic Guide – Cisco Blogs
Cisco is pleased to announce a new addition to the Forensic Investigation Procedures for First Responders series of documents that will help customers and partners triage Cisco products that are suspected of being tampered with or compromised. These guides provide step-by-step instructions for first responders that can be used to assess platform integrity and collect … [Read more...] about New Nexus Forensic Guide – Cisco Blogs
A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365
Microsoft 365 (M365), formerly called Office 365 (O365), is Microsoft's cloud strategy flagship product with major changes ahead, such as the deprecation of their legacy authentication protocols. Often stored on or saved to the device, Basic Authentication protocols rely on sending usernames and passwords with every request, increasing the risk of attackers capturing users' … [Read more...] about A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365
Download the Essential Guide to Response Automation
In the classic children's movie 'The Princess Bride,' one of the characters utters the phrase, "You keep using that word. I do not think it means what you think it means." It's freely used as a response to someone's misuse or misunderstanding of a word or phrase. "Response Automation" is another one of those phrases that have different meanings to different people. It's … [Read more...] about Download the Essential Guide to Response Automation
A Practical Guide for Startups
A common misconception among startup founders is that cybercriminals won't waste time on them, because they're not big or well known enough yet. But just because you are small doesn't mean you're not in the firing line. The size of a startup does not exempt it from cyber-attacks – that's because hackers constantly scan the internet looking for flaws that they can exploit; one … [Read more...] about A Practical Guide for Startups
A Guide to Weathering the Upcoming Vendor Positioning Storm
April is usually a whirlwind month for the cybersecurity industry as it coincides with the release of the highly regarded and influential MITRE ATT&CK test results. The ATT&CK test measures cybersecurity platforms' abilities to detect and react to emulated, multistep attacks that can be used as a barometer of platform effectiveness. This means that every cybersecurity … [Read more...] about A Guide to Weathering the Upcoming Vendor Positioning Storm
Decided to move on from your NGAV/EDR? A Guide for Small Security Teams to What’s Next
You're fully aware of the need to stop threats at the front door and then hunt any that got through that first gate, so your company installed an EPP/ EDR solution. But like most companies, you've already come across its shortcoming – and these are amplified since you have a small security team. More than likely, you noticed that it has its share of detection blind spots and … [Read more...] about Decided to move on from your NGAV/EDR? A Guide for Small Security Teams to What’s Next
A Handy Guide for Choosing a Managed Detection & Response (MDR) Service
Every company needs help with cybersecurity. No CISO ever said, "I have everything I need and am fully confident that our organization is fully protected against breaches." This is especially true for small and mid-sized enterprises that don't have the luxury of enormous cybersecurity budgets and a deep bench of cybersecurity experts. To address this issue, especially for small … [Read more...] about A Handy Guide for Choosing a Managed Detection & Response (MDR) Service