Cisco to offer Webex air-gapped cloud system for security, defense work

Building on its WebEx product line, Cisco plans to deliver an air-gapped, cloud-based collaboration system  for companies involved in US national security and defense work, extending the secure offerings the company already provides to industries that require collaboration tools with strong security measures to meet US government requirements.

Beginning in 2024, the new Webex system — Air-Gapped Trusted Cloud — will provide an added layer of security for teams collaborating through the Webex App, Cisco said.

An air gap is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. For example, an air-gapped computer is unable to connect to the internet or any other communications networks so as to have complete security with the information that resides within it.

To read this article in full, please click here

Read more

2022 holiday DDoS protection guide

Credit to Author: Paul Oliveria| Date: Tue, 15 Nov 2022 18:00:00 +0000

The holiday season is an exciting time for many people as they get to relax, connect with friends and family, and celebrate traditions. Organizations also have much to rejoice about during the holidays (for example, more sales for retailers and more players for gaming companies). Unfortunately, cyber attackers also look forward to this time of year to celebrate an emerging holiday tradition—distributed denial-of-service (DDoS) attacks.

The post 2022 holiday DDoS protection guide appeared first on Microsoft Security Blog.

Read more

Discover the anatomy of an external cyberattack surface with new RiskIQ report

Credit to Author: Christine Barrett| Date: Thu, 21 Apr 2022 16:00:00 +0000

Learn how supply chains, shadow IT, and other factors are growing the external attack surface—and where you need to defend your enterprise.

The post Discover the anatomy of an external cyberattack surface with new RiskIQ report appeared first on Microsoft Security Blog.

Read more

Microsoft and Zscaler help organizations implement the Zero Trust model

Credit to Author: Todd VanderArk| Date: Thu, 23 Jan 2020 17:00:27 +0000

Microsoft has built deep integrations with Zscaler—a cloud-native, multitenant security platform—to help organizations with their Zero Trust journey.

The post Microsoft and Zscaler help organizations implement the Zero Trust model appeared first on Microsoft Security.

Read more

Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model

Credit to Author: Todd VanderArk| Date: Wed, 23 Oct 2019 19:00:33 +0000

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.

The post Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model appeared first on Microsoft Security.

Read more