Making Agentic AI Work in the Real World

Making Agentic AI Work in the Real World

Two years ago, ChatGPT couldn’t even tell you what day it was. These early models were frozen at their training cutoff—brilliant conversationalists who could discuss Shakespeare but not yesterday’s news. Then came web search. Language models could suddenly fact-check themselves and pull current information. But they remained observers, not participants. They could tell you about the world but couldn’t touch it. Today’s agentic AI represents a fundamental shift: we’ve given these systems tools. Take this…

Read More

Streamline Regulation Mandates With NIST CSF and Secure Workload

Streamline Regulation Mandates With NIST CSF and Secure Workload

Regulations are often a contentious topic. While some argue they hinder innovation by introducing excessive bureaucracy, others contend that the absence of clear rules can lead to unquantified risks with wide-reaching consequences—from consumers and organizations to entire markets. However, there are moments when both sides of the debate align—and cybersecurity is one of those cases. But you may wonder, why cybersecurity? What is happening in this space that creates the required synergies? The answer is…

Read More

Introducing Secure Access – DNS Defense

Introducing Secure Access – DNS Defense

The Top-Ranked DNS Security Just Got Better Cost-effective protection of your organization’s network and users is critical. That’s why I’m excited to announce the availability of Cisco Secure Access – DNS Defense, the newest member of the Secure Access product family. Building upon Cisco’s position as the leading provider of DNS-layer security, we now offer a seamless pathway to our Universal ZTNA solution. Whether you’re a prospective customer looking to strengthen your network and user…

Read More

Redefining Security Management in a Hyperconnected World

Redefining Security Management in a Hyperconnected World

In today’s rapidly transforming world, Cisco is redefining security and its management. With the recent launch of the most advanced Hybrid Mesh Firewall and Universal Zero Trust Network Access (ZTNA) solutions, both managed under Security Cloud Control, we’re introducing a new way for you to interact, set policies, and troubleshoot. Security Cloud Control serves as a central hub, enabling cloud-delivered management across data centers, branch offices, clouds, and remote sites. It’s designed to integrate seamlessly…

Read More

Fusing Security Into the Network Fabric: From Hybrid Mesh Firewalls to Universal ZTNA

Fusing Security Into the Network Fabric: From Hybrid Mesh Firewalls to Universal ZTNA

If you’ve heard it once, you’ve probably heard it a million times: “today’s enterprise environments are becoming more and more complex.” I know it’s something I’ve been known to say a time or two (or a million). Here’s the thing: it’s true. There are several factors at play, but two of the biggest are the increasingly fine-grained composition and distribution of applications along with an increasingly distributed and mobile workforce. Then, while the rise of…

Read More

Simplifying Zero Trust Security for the Modern Workplace

Simplifying Zero Trust Security for the Modern Workplace

Organizations face an evolving array of cyber threats these days. As attackers have become more sophisticated, it is important to adopt a comprehensive security strategy that includes a layered approach and increased protection for the modern workplace. That includes the home office, branch, campus, coffee shop, or anywhere in between.  Cisco’s Enhanced User Protection Suite:  Cisco is proud to announce the latest enhancement to our User Protection Suite, with the addition of Cisco’s Identity Services…

Read More

You’ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

You’ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

In our previous blog post, we discussed how Cisco has reimagined Zero Trust, delivering an in-office experience for users and things from anywhere accessing resources everywhere. You’re probably thinking “Ok, but how? How exactly has Cisco reimagined Zero Trust Access?” You’re in the right place to get a look into the technical details. In this blog post, I’ll unpack some of the technological components that allow us to leapfrog legacy approaches, and in doing so,…

Read More

Re-Imagining Zero Trust With an In-Office Experience, Everywhere

Re-Imagining Zero Trust With an In-Office Experience, Everywhere

Let’s be honest. Most people don’t trust zero trust. For users, when they hear the words ‘zero trust’, it sounds like it might take longer to log into work. And if you’re in IT or IT security, you may have more products to buy and integrate into your existing — already complicated — security stack. And of course, then there are the audits. Maybe that’s why so many zero trust projects are stalled. No matter…

Read More

Seamless Secure Work on a Plane

Seamless Secure Work on a Plane

Frequent travelers – this blog is for you. Let’s start off by walking through the experience of the remote worker that is always on the move. This traveler has the perfectly packed bag. They know exactly what time to show up at the airport to walk directly onto the plane. And their accumulated miles are a prized possession. However, one thing this frequent traveler can’t control is the work experience once they’re on that plane….

Read More

Helping Ivanti VPN Customers

Helping Ivanti VPN Customers

In January 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a directive (with an update in February) mandating that all U.S. Federal agencies take Ivanti systems offline for remediation. Over 1,700 Ivanti systems have been compromised; affected Ivanti VPN products are Ivanti Connect Secure (formerly Pulse Secure) and Ivanti Policy Secure gateways. The vulnerabilities include CVE-2023-46805, CVE-2024-21887, CVE-2024-21888 and CVE-2024-21893. Cisco is helping customers move from Ivanti to Cisco Secure Access in order…

Read More
1 2