At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices.
That’s why Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development process. CSDL is a repeatable and measurable process we’ve designed to fortify the resiliency and trustworthiness of our offerings, allowing our customers to deploy high-quality products that they can trust.
Cisco SDL utilizes many industry standards and best practices, including ISO certification as part of our development processes. ISO certification provides customers validation and confidence that our processes, such as common technology requirements, secure coding procedures, code reviews, testing, and verification are consistently executed within our product development.
In 2013, we made internal compliance with the Cisco SDL process a stop-ship-grade requirement for all new Cisco products and development projects. As we make our way through 2014, we are building on this commitment, holding our teams accountable and training stakeholders to understand the importance of Cisco SDL process, adoption, and compliance.
From our Integrated Service Routers (ISRs) to our Aggregation Services Routers (ASRs), more products are being introduced across the Cisco portfolio that are Cisco SDL compliant. We look forward to keeping you up to date on progress with the CSDL initiative over the coming months.
Check out the video below where I explain Cisco SDL in more detail:
Learn more about Cisco SDL here: http://www.cisco.com/web/about/security/cspo/csdl/index.html
Tags: cisco sdl, cybersecurity, product certifications, supply chain, trustworthy systems
Most of us have seen the incredible progress and subsequent challenges in the arena of higher education, and there’s no doubt it’s been a big topic of discussion amongst the Cisco Education Team. So, we are excited to announce an upcoming blog series that will highlight some of the key trends, challenges and innovations we are seeing in higher education.
For the next few months, we will host a Thursday blog series focused on the changes in higher education. Starting next Thursday, our own Renee Patton will kick it off by highlighting many of the current trends and challenges. After that, stay tuned each Thursday as we feature blogs covering everything from research universities and online learning models to data sovereignty and analytics. Read More »
Tags: community college, connected learning, cybersecurity, edtech, highered, HigherEdThursdays, mlearning, SDN, university
The sixth season of the National CyberPatriot Competition kicked off back in November, and the National Finals are coming up: March 26th -- 29th. Conceived by the Air Force Association, CyberPatriot is a premier Internet defense competition designed to excite, educate, and motivate the next generation of network defenders, which are critical to our nation’s security. It is the largest high school cyber defense competition in the United States, with two divisions:
- Open Division -- Open to an accredited public or private institutions, registered home school associations, and community organizations like the Boy Scouts and Boys and Girls Clubs of America.
- All Service Division -- Open to students in Junior ROTC programs, Civil Air Patrol squadrons, and Naval Sea Cadet units. Read More »
Tags: competition, cyber threats, cybersecurity, edtech
Last week I had the opportunity to attend the AFCEA Homeland Security conference in Washington, D.C.
Eleven days after the September 11, 2001, terrorist attacks, the first Director of the Office of Homeland Security was appointed leading to the combination of 22 different federal departments and agencies into a unified, integrated cabinet agency when it was established in 2002.
The Department has a vital mission to secure the U.S. from many threats with capabilities that range from aviation and border security to emergency response, from cybersecurity to chemical facility inspections.
The three day conference focused on a number of important topics including:
- Mobility and Interoperability
- Information Sharing and Fusion Centers
- Big Data Analytics
- Role of Laboratories and Scientific Research in Homeland Security
- Cybersecurity Education and Continuous Diagnostics and Monitoring
Read More »
Tags: border security, cybersecurity, emergency response, Homeland Security, Mobile Government, national security, secure mobility, shared services
Technology in the public sector has revolutionized the way government agencies deliver services, conduct operations and secure sensitive information. Last week, I had the pleasure of learning from several prominent government leaders about how smart, visionary leaders have harnessed the power of new technology to transform the way they fulfill their respective missions.
We started by visiting the National Cybersecurity Center of Excellence (NCCoE) in Rockville, Maryland, which is part of the National Institute of Standards and Technology (NIST). When complete later in summer 2015 the NCCoE facility will be the epicenter of cybersecurity education, strategy and technology for government, academia and private industry and corporations such as Cisco. Now more than ever, such public-private partnerships are imperative in recognizing and thwarting common enemies who can wreak havoc by compromising sensitive information. This center will allow the top thinkers, practitioners, IT professionals and educators to collaborate and develop strategies to keep our sensitive information protected. Donna Dodson, director of the Center, hopes it will evolve into a hub for cyber solutions derived from government and private-sector tools. Read More »
Tags: cybersecurity, govtech, Internet of Everything, internet of things, IoE, IoT, security