crypto

October 21, 2022

LEARNING

Human-Machine Interactions of the Future: Unpopular Opinions [Part 3]

7 min read

Cisco Futurist Annie Hardy expands on the future of human-machine interaction in Part 3 of her Unpopular Opinions series. In this installment, find out why decentralization may not be as decentralized as many might hope for.

September 28, 2022

LEARNING

Human-Machine Interactions of the Future: Unpopular Opinions [Part 2]

5 min read

Cisco Futurist Annie Hardy expands on the future of human-machine interaction in Part 2 of her Unpopular Opinions series, explaining her vision of what the Metaverse (or Metaverses) will look like, why many aren't buying into the full adoption of Web3, and more.

September 8, 2022

LEARNING

Human-Machine Interactions of the Future: Unpopular Opinions [Part 1]

3 min read

Cisco Futurist Annie Hardy lays the foundation for understanding the terms, trends, and buzz behind the Metaverse and Web3 in the first blog in her series on the future of human-machine interaction.

April 19, 2018

SECURITY

Towards Backward-Compatible Post-Quantum Certificate Authentication

2 min read

Quantum computers would pose a threat to PKI algorithms and systems as we know today.

April 5, 2016

CLOUD

Cisco Cloud Services Platform 2100 and Cavium LiquidSecurity™ enable secure Crypto as a Service solution for NFV, Clou …

4 min read

Cisco and Cavium, Inc., a leading provider of semiconductor products that enable secure and intelligent processing for enterprise, data center, cloud, wired and wireless networking, today are announcing that Cisco is integrating Cavium’s LiquidSecurity™ family into the Cisco Cloud Services Platform (CSP) 2100. The CSP 2100 is a Network Functions Virtualization (NFV) turn-key & open […]

April 14, 2015

SECURITY

Cybersecurity in the Post-Quantum Era

3 min read

One of the great scientific challenges of our time is the construction of a practical quantum computer. Operating using the counterintuitive principles of quantum physics, such a device could rapidly explore an vast number of possible states. It could perform computational tasks that are far beyond our current capabilities, such as modeling molecules and designing […]

March 28, 2014

OPEN AT CISCO

In Search of The First Transaction

1 min read

At the height of an eventful week – Cloud and IoT developments, Open Source Think Tank,  Linux Foundation Summit – I learned about the fate of my fellow alumnus, an upperclassman as it were, the brilliant open source developer and crypto genius known for the first transaction on Bitcoin. Hal Finney is a Caltech graduate who went […]

April 2, 2013

SECURITY

David McGrew Discusses Legacy Encryption Solutions with Mike Danseglio of 1105 Media at RSA 2013

1 min read

Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can't keep up with current advances in hacking and brute force computing power. Additionally, legacy solutions are increasingly inefficient as security levels rise, and perform poorly at high data rates. In order to stay ahead of this challenge, encryption needs to evolve.