Businesses generate data—a lot of it—and the security of that data can have significant ramifications across entire organizations. While enterprise companies have IT departments dedicated to monitoring their cybersecurity, small businesses rarely have the same luxury.
In our newest Cybersecurity Report, we explore the ins and outs of threat hunting and provide a how-to guide for creating a threat-hunting team at your organization. With clear, easy-to-follow instructions and tips from veteran threat hunters, it is a must-read for cybersecurity professionals everywhere.
To protect your data, you must understand the traffic on your network. This task has become even more challenging with the widespread use of the Transport Layer Security (TLS) protocol, which inhibits traditional network security monitoring techniques.
It has been a year since last RSAC when I became head of the Cisco Security Business Group. During this time, we have greatly expanded the number of customers we both serve and protect while continuing to deliver market-leading innovation keeping ahead of today’s threats.
Work Anywhere, Securely, with Citrix and Cisco DuoMarch 8, 2021/
Cisco Secure Application: A New Approach to Application SecurityFebruary 8, 2021/
Cisco Nexus Blazes Forward with Ultra-Low Latency TechnologyNovember 9, 2020/