Meet the Cybersecurity Defender of 2025 for EMEA

Meet the Cybersecurity Defender of 2025 for EMEA

In an age when cyber threats loom large, the dedication and passion of cybersecurity professionals are more crucial than ever. Each year, Cisco makes a point of selecting and recognizing a standout cybersecurity advocate who has earned the title of cybersecurity defender. This year, it was impossible to choose just one individual. This is why Cisco’s 2025 EMEA Cybersecurity Defender of the Year award goes out to a team of practitioners at SAP Enterprise Cloud…

Read More

Simplifying Zero Trust Security for the Modern Workplace

Simplifying Zero Trust Security for the Modern Workplace

Organizations face an evolving array of cyber threats these days. As attackers have become more sophisticated, it is important to adopt a comprehensive security strategy that includes a layered approach and increased protection for the modern workplace. That includes the home office, branch, campus, coffee shop, or anywhere in between.  Cisco’s Enhanced User Protection Suite:  Cisco is proud to announce the latest enhancement to our User Protection Suite, with the addition of Cisco’s Identity Services…

Read More

Reducing Help Desk Tickets With Cisco’s User Protection Suite

Reducing Help Desk Tickets With Cisco’s User Protection Suite

Challenges with help desk tickets Things don’t always go as planned for your employees, especially remote workers. They may not be able to login to their accounts, have forgotten their password, are unable to access an application or are facing connectivity issues. While there are many benefits of help desk tickets, there are also hidden costs. When tickets start to pile up, as they have done since the rise of remote work, that means a…

Read More

You’ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

You’ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

In our previous blog post, we discussed how Cisco has reimagined Zero Trust, delivering an in-office experience for users and things from anywhere accessing resources everywhere. You’re probably thinking “Ok, but how? How exactly has Cisco reimagined Zero Trust Access?” You’re in the right place to get a look into the technical details. In this blog post, I’ll unpack some of the technological components that allow us to leapfrog legacy approaches, and in doing so,…

Read More

Layered Protection for RADIUS With Cisco

Layered Protection for RADIUS With Cisco

Dream world for the CISO Organizations have a wide variety of resources to protect. And some resources are easier to protect than others. However, it’s not the easy stuff that keeps a CISO up at night. Before we dive into the more challenging examples, let’s consider a scenario that allows a CISO to sleep peacefully. In this scenario, when a worker “goes to work” (either in the office or remotely), they open their corporate laptop…

Read More

Seamless Secure Work on a Plane

Seamless Secure Work on a Plane

Frequent travelers – this blog is for you. Let’s start off by walking through the experience of the remote worker that is always on the move. This traveler has the perfectly packed bag. They know exactly what time to show up at the airport to walk directly onto the plane. And their accumulated miles are a prized possession. However, one thing this frequent traveler can’t control is the work experience once they’re on that plane….

Read More

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

The threat landscape is full of moving targets. Over time, popular tools, tactics, and procedures change. Malicious techniques fall out of fashion, only to come roaring back months, if not years, later. All the while, security practitioners monitor network traffic and adapt their defenses to protect their users and networks. Keeping on top of these trends is one of the most challenging tasks for any security team. One great area to look for trends is…

Read More

Cisco Secure Access Wins Global Security Service Edge Customer Value Leadership Award

Cisco Secure Access Wins Global Security Service Edge Customer Value Leadership Award

It’s one thing to claim leadership in cloud security; it’s another to have that leadership acknowledged by industry experts. That’s why we’re thrilled to announce our recent recognition by Frost & Sullivan as the 2024 Customer Value Leader in the Global Security Service Edge Industry. This expert analyst award is a testament to both our commitment to innovation and our unique ability to partner with security leaders to navigate the complexity of securing cloud environments….

Read More

Complexity drives more than security risk. Secure Access can help with that too.

Complexity drives more than security risk. Secure Access can help with that too.

Modern networks are complex, often involving hybrid work models and a mix of first- and third-party applications and infrastructure. In response, organizations have adopted security service edge (SSE) solutions, such as Cisco Secure Access, to protect users regardless of where they are located or what they are accessing. This reliance on third-party infrastructure doesn’t only drive security risk, it also increases the likelihood of performance outages and disruptions. Oftentimes, these disruptions are the result of…

Read More

Mitigating Lateral Movement with Zero Trust Access

Mitigating Lateral Movement with Zero Trust Access

Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their users, it’s worthwhile to analyze attacker techniques, as well as the protections and controls SSE solutions use to disrupt them. It’s useful to use the MITRE ATT&CK framework. MITRE ATT&CK is a large knowledgebase of attacker techniques that cybersecurity experts use to describe the attack kill chains…

Read More
1 2