So, your organization’s simplifying Kubernetes management with AWS’s Elastic Kubernetes Service (EKS). Now, how are you going to secure that cluster? Whether your role is on the application team, or in DevOps or SecOps, you might be thinking: We chose EKS because agility is important to us. Similarly, we need manageable and efficient security, so we can stay focused on what … [Read more...] about Securing AWS EKS Environments – Cisco Blogs
Cisco
In case you missed it: check out what’s new with SecureX from Cisco Live!
For the first time ever, Cisco is bringing customers and partners from all around the world together for an all-in-one global event! This week, we are delivering an experience unlike any other; this comes at an interesting time for Cisco SecureX. SecureX has been simplifying security for almost an entire year now and it has defined what a true security platform approach means … [Read more...] about In case you missed it: check out what’s new with SecureX from Cisco Live!
Introducing The Cisco Telemetry Broker
Today’s security professionals face a growing number of competing priorities. Where a CIO’s job was once to “keep the lights on,” they are now asked to be part of conversations around revenue generation. Top of mind are discussions around migrating workloads to the cloud, being proper stewards of customer data, all while finding ways to maximize all of the data at their … [Read more...] about Introducing The Cisco Telemetry Broker
Cisco Email Security Expands, Simplified to Detect More Threats, Stop More Attacks
SecureX integration offers customers greater visibility to threats across technology silos Email threats continue to rise rapidly in volume and complexity. With email being the number one threat vector, it’s no surprise that 94 percent of malware is delivered via email, and it remains the easiest way for attackers to breach an organization. Email security is complex and of … [Read more...] about Cisco Email Security Expands, Simplified to Detect More Threats, Stop More Attacks
Cisco Secure Email: A Proven and Consistent Leader
As email borne threats continue to increase in volume and complexity, keeping email safe continues to be a top priority for security professionals. These varied and persistent threats include Business Email Compromise (BEC), ransomware, domain compromise, malware, phishing, spam and account takeovers. The damage they cause affects an organization’s bottom line and … [Read more...] about Cisco Secure Email: A Proven and Consistent Leader
Third-Party Software Security Scanning – Cisco Blogs
This blog is co-authored by Nur Hayat and is part two of a four-part series about DevSecOps. Earlier in this series we covered how Continuous Security Buddy (CSB) for continuous integration/continuous delivery (CI/CD) — CSB for CI/CD — provides an automation framework for holistic, continuous security based on DevSecOps principles. In this blog, let’s take a closer look at … [Read more...] about Third-Party Software Security Scanning – Cisco Blogs
Detecting and Responding to SolarWinds Infrastructure Attack with Cisco Secure Analytics
On December 8, FireEye reported that it had been compromised in a sophisticated supply chain attack: more specifically through the SolarWinds Orion IT monitoring and management software. The attackers leveraged business software updates in order to distribute a malware named SUNBURST, and then used this foothold in the organization to contact their Command & Control … [Read more...] about Detecting and Responding to SolarWinds Infrastructure Attack with Cisco Secure Analytics
Cisco Secure Application: A New Approach to Application Security
It’s no surprise that the events of 2020 drastically changed the IT landscape, as millions of people began working from home, accessing apps from a multitude of devices on public internet and service providers. As organizations embraced hybrid/multi-cloud technologies, vastly expanding the perimeter of IT, they also faced an unprecedented rise in malicious security threats and … [Read more...] about Cisco Secure Application: A New Approach to Application Security
Critical Flaws Reported in Cisco VPN Routers for Businesses—Patch ASAP
Cisco has rolled out fixes for multiple critical vulnerabilities in the web-based management interface of Small Business routers that could potentially allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. The flaws — tracked from CVE-2021-1289 through CVE-2021-1295 (CVSS score 9.8) — impact RV160, RV160W, RV260, RV260P, and … [Read more...] about Critical Flaws Reported in Cisco VPN Routers for Businesses—Patch ASAP
Time to Refresh: Leapfrogging Security with Cisco SecureX
What is the first thing that comes to your mind when you hear the words “tech refresh?” For example, do you think about an antiquated technology that is not integrated needing a fresh lease of life? Or is it just getting new technology to solve a problem that the predecessor failed at solving? Or is it part of a much larger attempt to transform security to become an enabler … [Read more...] about Time to Refresh: Leapfrogging Security with Cisco SecureX