trustworthy systems

April 20, 2020

NETWORKING

Trustworthy Networking is Not Just Technological, It’s Cultural

9 min read

With the multitude of dangers constantly testing networks, there should be no such concept of “implicit trust”. At the core of the defensive network is the principle of proven trustworthy hardware and software, working in conjunction to protect network devices, data, and applications from attacks.

January 28, 2020

SP360: SERVICE PROVIDER

XR7, Not Just Another Release

4 min read

Find out why IOS XR7 is more than just a mere new release — Its noteworthy evolutions make it simple, modern, trustworthy, and cloud-enhanced.

Affirming Trustworthiness of Critical Infrastructure

3 min read

How do you establish a strong infrastructure foundation that preserves integrity and reinforces trust? We'll show you how to cryptographically gather evidence to affirm trustworthiness of your trusted network.

July 17, 2017

DATA CENTER

For Data Center Security, It’s Not ‘Trust, but Verify’, Verify Again, and then Trust

3 min read

According to the Cisco 2017 Annual Security Report, security attacks on businesses have significant consequences with nearly quarter of these companies suffering lost business opportunities, 20 percent of them losing customers, and more than 30 percent of them losing revenue. For example, the recent rash of ransomware attacks around the globe are expected to cost […]

October 8, 2015

SECURITY

Cybersecurity: The Holistic Trust Approach

4 min read

In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco,...

July 27, 2015

SECURITY

The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies

1 min read

This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity. Cisco has […]

April 14, 2014

SECURITY

Building in Security from the Ground Up with The Cisco Secure Development Lifecycle

1 min read

At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices. That’s why Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development […]