Articles
Why the UN Convention Against Cybercrime Requires a Second Look
3 min read
Effective international cooperation is essential to combat global cybercrime and uphold shared values, but the latest UN Convention against Cybercrime falls short and requires more attention before ratification by member states.
CISA Cybersecurity Strategic Plan: An Important Step To Secure Critical Infrastructure
1 min read
As a founding member of the Network Resilience Coalition, Cisco appreciates CISA’s shared commitment to focusing attention and investment on efforts to secure and maintain existing critical networked technologies.
National Cybersecurity Strategy: Public-Private Partnership Required to Successfully Meet 21st Century Challenges
1 min read
Cisco comments on the Biden administration's new National Cybersecurity Strategy.
An Action Plan to Boost Open Source Security
1 min read
Last week, Cisco’s Head of Open Source, Stephen Augustus, and I joined nearly 100 executives from 37 companies and leaders from the White House and across the U.S. federal government in Washington DC at the Open Source Software Security Summit II to finalize an action plan to boost the security of open source software (“OSS”). […]
Cisco Applauds Senate Passage of the Strengthening American Cybersecurity Act of 2022
1 min read
Cisco applauds and continues to emphasize the importance of the govenment sharing actionable cyber threat information with the private sector as quickly, and at the lowest level of classification, as possible.
Cisco Responds to Biden Administration Critical Infrastructure Cybersecurity Memorandum
1 min read
Cisco's Eric Wenger, Senior Director of Technology Policy, Global Government Affairs, welcomes the continued attention that the U.S. federal government is applying to secure critical infrastructure (CI).
Are Openness and Security Both Possible in a 5G World?
2 min read
Well-designed, open wireless network architectures using Open RAN can actually yield security benefits over closed architectures, but federally-funded research is a critical step on that path.
Security in Open RAN Networks
4 min read
Many mobile network operators are considering deployment of open, decomposed, and modular radio access networks for 5G advanced wireless networks. The business rationale for adopting this network architecture is evident in light of the current state of the supply chain for network infrastructure. The current pool of vendors for technology in the Radio Access Network […]
Building an Effective Privacy Framework
1 min read
We are encouraged to see NIST building on the model of the highly successful Cybersecurity Framework CSF to address privacy and data protection concerns. The CSF has proved the power...