Innovative OT Security Solutions by Cisco at RSAC 2025

Innovative OT Security Solutions by Cisco at RSAC 2025

The world’s cybersecurity community is gearing up to meet at the RSAC™ 2025 Conference in San Francisco. I’m looking forward to reconnecting with old friends, making new ones, and discussing OT security needs with industrial organizations. Be sure you stop by the Cisco booth and say Hi! We’ll be showcasing the latest features of Industrial Threat Defense, Cisco’s comprehensive and highly modular OT security solution. It uses the industrial network as the fabric to easily…

Read More

Cisco Industrial Security: Your blueprint for securing critical infrastructure

Cisco Industrial Security: Your blueprint for securing critical infrastructure

Safeguarding industrial control systems (ICS) from cyber threats is a critical priority, but transforming these intentions into effective actions can be challenging. Given the complexity of ICS and their networks, which often rely on outdated technologies and inadequate security measures, it can be difficult to determine the best starting point. Cisco Validated Designs (CVDs) are proven networking and security reference architectures that industrial organizations can use to build advanced capabilities and create a flexible foundation…

Read More

Unleash OT Security with the Best of IT

Unleash OT Security with the Best of IT

If I were planning security for an exhibit of the crown jewels, you can be sure I’d coordinate efforts with other galleries in the facility. After all, a thief who broke into an adjoining gallery would be just a wall away from breaching mine. The same applies to securing operational technology (OT) and information technology (IT) networks. IDC highlights the need for IT/OT collaboration on cybersecurity in a new Infobrief called “The Future of Industrial…

Read More

Cisco advances embedded cyber resilience in industrial routers

Cisco advances embedded cyber resilience in industrial routers

Whether you are trying to reduce delays in your railways operations, enhance the stability of the power grid, improve road safety by deploying Intelligent Transportation Systems (ITS), or pull data from wind turbines to create an optimized repair schedule, you are facing the same challenge – connecting more OT (operational technology) assets while making your critical infrastructure more cyber resilient. Building modern and agile operations across a city, a region, or a country is not…

Read More

Secure Firewall & Multicloud Defense: Secure Connectivity With Simplified Policy Across Clouds

Secure Firewall & Multicloud Defense: Secure Connectivity With Simplified Policy Across Clouds

Most of our large customers today have datacenters and leverage multiple clouds to maximize flexibility and agility for meeting their business needs. Traditionally, the security for these environments has rested with different teams, each having their own tools and processes. But as our application and IT environments become more interwoven, the complexity of the environments and the challenge of securing them has massively increased. Siloed tools and teams are now part of the problem, generating…

Read More

Keeping the lights on: Brazilian power utility wins cybersecurity award for securing grid network with Cisco

Keeping the lights on: Brazilian power utility wins cybersecurity award for securing grid network with Cisco

Cyberattacks on electric power utilities are on the rise. From 2020 to 2022, weekly attacks more than doubled. An attack that exploits a vulnerability in intelligent electronic devices (IEDs) like power distribution units, relay, and circuit breakers can turn off the lights in a neighborhood or entire city. On the surface, it seems simple enough to remediate vulnerabilities as soon as they’re reported—for example, by upgrading firmware. Fact is, detecting and remediating vulnerabilities in operational…

Read More

Determining the 10 most critical vulnerabilities on your network

Determining the 10 most critical vulnerabilities on your network

When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on. More data can be a double-edged sword. You want to know when events happen across different systems and through disparate vectors. However alert fatigue is a real thing, so quality over quantity matters. The real power of having…

Read More

The myth of the long-tail vulnerability

The myth of the long-tail vulnerability

Modern-day vulnerability management tends to follow a straightforward procedure. From a high level, this can be summed up in the following steps: Identify the vulnerabilities in your environment Prioritize which vulnerabilities to address Remediate the vulnerabilities When high-profile vulnerabilities are disclosed, they tend to be prioritized due to concerns that your organization will be hammered with exploit attempts. The general impression is that this malicious activity is highest shortly after disclosure, then decreases as workarounds…

Read More