Articles
Automating Explicit Trust
2 min read
We’ve talked about the market transition from implicit to explicit trust. It’s not enough to go on the word of an individual or the reputation of a vendor, customers are demanding explicit trust. Explicit trust is trust that is earned, not assumed. In other words, our customers are demanding evidence to confirm trust. I am […]
The Network’s Role in Securing the IoT
3 min read
Over the past few weeks, I’ve blogged about the importance of having a holistic security strategy for the Internet of Things (IoT). Now is the time to really amp up security and privacy by design at the endpoint device level. Everyone has a role to play. We know that enterprises are struggling to secure their […]
Demanding a Plan for Cyber Resilience in the IoT
3 min read
Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing’ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring and their negative […]
Yesterday’s Cyber Posture Just Won’t Work
2 min read
Many enterprises are still relying on yesterday’s cyber protection methods and infrastructure for their IT digitization efforts. Enterprises must also update their approach to cyber resilience in order to protect the full breadth of their operations.
IoT Isn’t Just About the ‘Thing’
3 min read
Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of locations and sources, to […]
Three Essential Elements of a Reliable Cyber Resilience Strategy
3 min read
Next week’s NCSA Nasdaq Cybersecurity Summit in New York will focus government and private sector leaders on two priorities—developing a strategic approach to combating pervasive cyber threats and creating a culture of cybersecurity across enterprises. These are critical issues that Cisco is addressing head-on, and we are excited and proud to be a part of […]
Why the “Seven Steps of Cyber Resilience” Prove Critical for Digital Transformation
3 min read
Organizations aren’t just talking about digital transformation – they’re doing it: More than 75 percent of global business leaders cite digitization as a top strategic priority and nearly seven in ten say their company will meet its digital transformation objectives this year, according to a recent survey from The Economist Intelligence Unit. To advance these […]
IoT: Securing the Next Chapter of the Digitization “Book”
3 min read
The Internet of Things (IoT) era is here: Nearly two-thirds of organizations currently collect data from equipment, devices or other connected endpoints and use it for a business purpose,...
The Time Is Now for Organizations to Address Their Aging Infrastructure
3 min read
Cisco has been working to draw attention to the hidden security risks organizations face by not properly maintaining their aging infrastructure and patching vulnerable systems. Threat actors, including ransomware operators, are using vulnerable Internet infrastructure as a foothold to launch their campaigns. The trends lead us to believe we should expect to see more of […]
Security and Trust That Is Foundational to Reducing Cyber Risks
2 min read
Did you know that Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development process? Cisco SDL is a repeatable and measurable process we’ve designed to fortify the resiliency and trustworthiness of our offerings. Are your customers aware of this foundational security? Did you know […]
Built-In Security: Sharing the ‘How’
2 min read
I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent post, the […]
Are you protecting your organization with comprehensive security and trust?
2 min read
With cyber threats escalating, security has emerged as a critical business driver and competitive differentiator. Organizations that successfully embed security throughout their network infrastructure, policies, processes, and culture are able to reduce risk while creating sustainable business advantage. At CiscoLive Berlin this year, we will examine how Cisco is building foundational security into the underlying […]
Why Aging Infrastructure Is a Growing Problem
2 min read
Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco […]
Update for Customers
1 min read
Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com Our development practices […]
Introducing the Cisco Technology Verification Service
2 min read
Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this journey more than 10 years ago […]
What’s in Your Network? Verifying Trust with Integrity Verification Service
2 min read
As we continue to observe National Cyber Security Awareness Month, it’s time this week to think about integrity verification and what it means for your network and your organization. As today’s network threats increase in sophistication, the resulting risks to a business’s or government agency’s network may go undetected for days, months or even years. […]
Cybersecurity: The Holistic Trust Approach
4 min read
In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco,...
IT Security: When Maturity is Overrated
3 min read
In so many parts of life, the passing of time is a benefit. Wine and whisky mature, intelligence is gained, and friendships grow stronger. For those of us working in IT security, however, the passing of time brings new challenges. Prolonging the use of older technology exponentially increases risk and the resulting problems can cost […]
The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies
1 min read
This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity. Cisco has […]
Trust and Transparency
2 min read
“In our increasingly interconnected world, the Internet of Everything is making trust a critical element of how people use network-connected devices to work, play, live, and learn. The relentless rise in information security breaches underscores the deep need for enterprises to trust that their systems, data, business partners, customers, and citizens are safe.” – John […]
Industry Recognition for Security Excellence
1 min read
Cybersecurity is a company-wide initiative. It touches every line of business, the technology, the fabric of the organization, its culture, brand and reputation. Customers are telling us that their most important issues are security and assuring the integrity of the products and data in their networks. In light of the heightened potential for cyber threats, trust […]
Cisco’s First Transparency Report on Law Enforcement Requests for Customer Data
1 min read
As Cisco’s products and services evolve to new models, we find ourselves coming in contact with our customer’s data more regularly. We approach this role as stewards of this data with our customers interest foremost in our mind. One area of widespread interest as it relates to this data is how we interact with Global […]
Cisco, Linux Foundation, and OpenSSL
1 min read
The recent OpenSSL Heartbleed vulnerability has shown that technology leaders must work together to secure the Internet’s critical infrastructure. That’s why Cisco is proud to be a founding supporter of the Linux Foundation initiative announced yesterday (April 24th). The initiative will fund open source projects that are critical to core computing and Internet functions, and […]
A Crypto Conversation: How We Choose Algorithms
2 min read
Cryptography is critical to secure, trustworthy communications. Recent questions within the tech industry have created entirely new discussions about the cryptography underpinning our communications infrastructure. While some in the media have focused on the algorithm chosen for Deterministic Random Bit Generation (DRBG), we’ve seen many more look to have a broader crypto conversation. With this […]
1