Discover how our world-class engineers tackle dynamic problems in computer science and deliver groundbreaking AI and ML innovations that are shaping the future of technology.
This blog is jointly written by Amy Chang, Hyrum Anderson, Rajiv Dattani, and Rune Kvist. We are excited to announce Cisco as a technical contributor to AIUC-1. The standard will operationalize Cisco’s Integrated AI Security and Safety Framework
This blog was written in collaboration with Yuqing Gao, Jian Tan, Fan Bu, Ali Dabir, Hamid Amini, Doosan Jung, Yury Sokolov, Lei Jin, and Derek Engi. LLMs can sound very convincing, but in network operations, sounding right isn’t enough. Network
When your CISO mentions “AI security” in the next board meeting, what exactly do they mean? Are they talking about protecting your AI systems from attacks? Using AI to catch hackers? Preventing employees from leaking data to an unapproved
This blog was written in collaboration with Fan Bu, Jason Mackay, Borya Sobolev, Dev Khanolkar, Ali Dabir, Puneet Kamal, Li Zhang, and Lei Jin. “Everything is a file”; some are databases Introduction Machine data underpins observability
The Model Context Protocol (MCP) and Agent-to-Agent (A2A) have gained a significant industry attention over the past year. MCP first grabbed the world’s attention in dramatic fashion when it was published by Anthropic in November 2024, garnering tens
This blog is written in collaboration by Amy Chang, Vineeth Sai Narajala, and Idan Habler Over the past few weeks, Clawdbot (then renamed Moltbot, later renamed OpenClaw) has achieved virality as an open source, self-hosted personal AI assistant agent
The adoption of AI agents and large language models (LLMs) is transforming how organizations operate. Automation, decision-making, and digital workflows are advancing rapidly. However, this progress presents a paradox: the same agency that makes AI so
A model context protocol (MCP) tool can claim to execute a benign task such as “validate email addresses,” but if the tool is compromised, it can be redirected to fulfill ulterior motives, such as exfiltrating your entire address book to an external
The New Baseline for AI Security AI is no longer an experimental capability or a back-office automation tool: it is becoming a core operational layer inside modern enterprises. The pace of adoption is breathtaking. Yet, according to Cisco’s 2025 AI