Cisco develops and manufactures networking hardware, software, and telecommunications equipment for enterprises, service providers, and data centers. The company provides products including routers, switches, security systems, collaboration tools, and infrastructure solutions designed for traditional and AI-driven workloads. UpGuard continuously monitors the security posture of Cisco using open-source, commercial, and proprietary threat intelligence feeds. Our analysis is centered on objective, externally verifiable information.
Cisco's security rating is based on the analysis of their external attack surface. The higher the rating, the better their security posture. Start a free trial to get a more in-depth risk assessment for Cisco.
Last updated April 30, 2026
This vendor risk report is based on UpGuard's continuous monitoring of Cisco's security posture using open-source, commercial, and proprietary threat intelligence feeds. The results are summarized into a security rating based on the analysis of hundreds of individual checks across five risk categories: website security, email security, phishing & malware, brand & reputation risk, and network security.
DMARC reject policy provides the most effective protection against fraudulent emails being sent from a domain.
DMARC protects against fraudulent emails being sent from a domain.
Sender Policy Framework (SPF) record passes basic syntax checks.
DMARC policy percentage is set to default 100%, ensuring all mail is covered by the policy.
Sender Policy Framework (SPF) record strictly enforces specific domains allowed to send email on its behalf.
Sender Policy Framework (SPF) record does not include the ptr mechanism.
DNSSEC records prevent third parties from forging the records that guarantee a domain's identity. DNSSEC should be configured for this domain.
No unregistered MX records that could lead to receiving mail on behalf of the target organization were detected.
Domain has not expired.
Domain does not expire within 30 days.
Domain is not flagged as inactive.
Domain is not pending deletion with the registrar.
Domain is not pending restoration with the registrar.
Domain is protected from unsolicited deletion requests with the registrar or registry.
Domain is protected from unsolicited transfer requests.
Domain is protected from unsolicited update requests with the registrar or registry.
Domain is not under a DNS resolution hold with the registrar.
Domain is not under a DNS resolution hold with the registry itself.
Domain is not prohibited from renewal at the registry itself.
The domain contains a valid Certification Authority Authorization (CAA) record. A CAA record indicates which Certificate Authorities (CAs) are authorized to issue certificates for a domain.
Commonly used Diffie-Hellman primes smaller than 2048 bits are likely to have been broken by organized groups or nation-state actors, allowing passive eavesdropping on traffic. It is recommended to use a 2048 bit or stronger Diffie-Hellman prime.
Without HSTS enforced, people browsing this site are more susceptible to man-in-the-middle attacks. The server should be configured to support HSTS.
SSL certificate has less than 20% of its total valid period remaining. The certificate will need to be renewed to avoid expiry.
The domain was not found on the HSTS preload list. Users who visit the website for the first time will be vulnerable to MITM attacks. The requirements for inclusion on the preload list are specified by hstspreload.org.
The HTTP Strict Transport Security (HSTS) header does not contain the includeSubDomains directive. This directive instructs the browser to also enforce the HSTS policy over subdomains of this domain.
Weak cipher suites can potentially be broken by a well resourced attacker, and should not be supported by the server unless very old devices or browsers must be supported.
The site's certificate chain was checked against our list of revoked certificates.
SSL is supported for this site.
All HTTP requests are redirected to HTTPS.
The site's hostname matches the SSL certificate.
SSL certificate has not expired.
The certificate presented by this domain was issued by a trusted certificate authority.
No insecure SSL/TLS versions are available for this site.
A complete SSL certificate chain was presented by the server for this domain.
SSL intermediate and root certificates do not expire within 20 days.
The SSL certificate presented by the server has an expiration period shorter than 398 days.
Industry standard SHA-256 encryption in use.
The site's public certificate provides at least 112 bits of security strength.
Infostealer malware has been detected on systems associated with this organization, indicating a potential data breach.
This IP/domain has not been reported as a source of botnet activity in the last 30 days.
This IP/domain did not appear on any list of IPs and domains known to perform brute force login attempts in the last 30 days.
This IP/domain has been reported for distributing malware in the last 30 days.
This IP/domain has not been reported for performing unsolicited scanning in the last 30 days.
This IP/domain has not been reported as a phishing site in the last 30 days.
This IP/domain has not been reported as a source of botnet activity in the last 90 days.
This IP/domain did not appear on any list of IPs and domains known to perform brute force login attempts in the last 90 days.
This IP/domain has been reported for distributing malware in the last 90 days.
This IP/domain has not been reported for performing unsolicited scanning in the last 90 days.
This IP/domain has not been reported as a phishing site in the last 90 days.
A bug in OpenSSL's implementation of the TLS heartbeat extension allows access to portions of memory on the targeted host e.g. cryptographic keys and passwords.
The server does not support SSLv3, and is not vulnerable to the POODLE attack.
The server does not offer RSA_EXPORT cipher suites, so clients are not vulnerable to the FREAK attack.
The server is using strong Diffie-Hellman parameters and is not vulnerable to the Logjam attack.
Security incidents, news, and data leaks relating to Cisco.
A cyberattack involving Cisco was reported in February 2026. See incident details, impact on customers, and recommended security measures.
An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches. The threat actors claim to be part of the ShinyHunters, Scattered Spider, and Lapsus$ groups, collectively referring to themselves as "Scattered Lapsus$ Hunters."
Compare Cisco's security performance with other companies in their industry.
Stripe provides financial infrastructure and payment processing services for businesses of all sizes to accept online and in-person payments. The company offers tools for managing subscriptions, billing models, fraud prevention, money movement, and embedded financial services through APIs and integrations.
Amazon.com operates an online retail platform offering a wide range of consumer products, including electronics, books, clothing, and household goods. The company also provides cloud computing services through Amazon Web Services and operates digital streaming and subscription services.
Verizon provides wireless telecommunications services, home internet connectivity, and digital television offerings to consumer and business customers. The company operates mobile networks and fiber-optic infrastructure to deliver voice, data, and video services across the United States.
Commonwealth Bank provides financial services including personal and business banking accounts, credit cards, home loans, insurance products, and investment services. The company operates retail branches and digital banking platforms across Australia, offering foreign exchange services and institutional banking solutions.
DocuSign provides electronic signature software and intelligent agreement management solutions that enable organizations to create, sign, track, and manage digital contracts and documents. The company's platform includes AI-powered tools for agreement analysis, automated workflows, contract lifecycle management, and integrations with business applications like Salesforce.
IBM provides enterprise technology solutions including artificial intelligence platforms, cloud computing services, IT infrastructure, consulting, and business software. The company develops products such as watsonx AI systems, data analytics tools, automation software, cybersecurity solutions, and computing hardware for organizations across various industries.
The ultimate guide to attack surface and third-party risk management – actionable advice for security teams, managers, and executives.
Security research and global news about data breaches.
Explore resourcesArticles, news, and research on third-party risk management.
Explore resourcesArticles, news, and research on attack surface management.
Explore resourcesArticles, news, and research on cybersecurity.
Explore resources