Articles
The Need for Continuous and Dynamic Threat Modeling
5 min read
The trend towards accelerated application development, regularly updating the architecture through an agile methodology, led us to strategize ways to continuously, and dynamically, threat model an application architecture during runtime.
Test Automation for Application Security
5 min read
After an application is developed, multiple security tests must be run to ensure it’s ready for deployment. Learn how Cisco validates its software based on industry and internal security standards.
Third-Party Software Security Scanning
4 min read
Third-party software is ubiquitous across product development. With it grows the interest for more accurate visibility, accounting of open source and commercial components, and for proper management and hygiene.
A Framework for Continuous Security
4 min read
Maintaining the resiliency of data, assets, systems, and the network is mission-critical. DevOps must continuously improve resiliency with application security tools that automate security posture assessment and manage security risks.
DevSecOps: Lessons Learned
4 min read
Adoption of DevSecOps and the security improvements thereof has been quite impressive and has exceeded our own initial expectations.
DevSecOps: Automation for Assurance
3 min read
This is Part 3 in our Four Part DevSecOps Blog Series In Part 2 of this blog series, DevSecOps - Security at the Speed of Business, we explained the...
DevSecOps: Security at the Speed of Business
3 min read
In Part One of this blog series DevSecOps - Win Win for All, we established a foundation for DevSecOps practices with our Cloud Security Manifesto. In Part 2 of this series, we will describe another key aspect of DevSecOps – developing security guardrails with a hands-on approach via Agile hackathons.
DevSecOps: Win-Win for All
2 min read
[This is part one of a four-part blog series about DevSecOps.] Today, companies are transforming their business to offer customers connected digital experiences where products and services are increasingly powered by mobile, cloud and data analytics capabilities. Developers in turn are moving to Development Operations (DevOps) processes to meet the need for greater agility and […]
For Women in Cybersecurity, Possibilities are Endless
2 min read
This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and