Gartner: 3 Actions to Achieve Cybersecurity Consolidation

Gartner: 3 Actions to Achieve Cybersecurity Consolidation

Cybersecurity leaders are grappling with the complexity, overlap and blind spots that come from using multiple cybersecurity vendors and tools. Many of the products offered by cybersecurity vendors have overlapping capabilities, making it easy for misconfigurations to occur and difficult to uncover security gaps. Consolidating cybersecurity products reduces this complexity by streamlining the number of products and their interactions, thus improving efficiency of security outcomes. Organizations consolidate security solutions for a variety of reasons, such…

Read More

Mobile vehicle barriers: Long-term security solution for temporary events

Mobile vehicle barriers: Long-term security solution for temporary events

At around 4:40 p.m. on November 21, 2021, Darrell E. Brooks Jr. shocked the nation when he drove a red SUV through an annual Christmas parade in Waukesha, Wisconsin. The incident was over almost as quickly as it began, leaving 6 dead and dozens injured. Why Brooks did this is still largely unknown, however, witnesses felt this was “a direct intent to hit as many parade participants as possible.”  Unfortunately, intentional vehicle ramming incidents at…

Read More

Cisco Duo and ISE: Better together in the cybersecurity battlefield

Cisco Duo and ISE: Better together in the cybersecurity battlefield

The world of cybersecurity never stops changing. Every day bad actors grow bolder and more devious as they try to break your security, steal your data, and offer it back to you for ransom. They’ve become very good at what they do, and they only need one small crack in your security to wreak the most havoc. There are network sentries that guard your network, but where one solution is good—two is a much stronger…

Read More

Bringing Simplicity to Security: The Journey of the Cisco Security Cloud

Bringing Simplicity to Security: The Journey of the Cisco Security Cloud

In June of 2022 at the RSA Conference, we announced our vision for the Cisco Security Cloud Platform. We set out to provide an integrated experience to securely connect people and devices everywhere to applications and data anywhere. We focused on providing an open platform for threat prevention, detection, response, and remediation capabilities at scale. Since the announcement, we’ve been working hard to deliver, and the core of what we’ve accomplished has been rooted in…

Read More

Improve protection and simplify security with Cisco Security

Improve protection and simplify security with Cisco Security

The security industry has a long history of innovation and stewardship in technology. However, every time there is a new security problem, a new product arrives on the market to address that specific issue. While these products can be good, they have led to an over-proliferation of point products that don’t completely solve customer needs. They also add costs and complexity.     Moreover, with an ever-increasing number of remote and frontline workers, and more…

Read More

Are federal regulations the watershed moment for zero trust?

Are federal regulations the watershed moment for zero trust?

Are federal regulations the watershed moment for zero trust? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Regulating patrols and processes without micromanaging your security team

Regulating patrols and processes without micromanaging your security team

Regulating patrols and processes without micromanaging your security team | 2021-07-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More