Security

October 17, 2013

SECURITY

A Crypto Conversation: How We Choose Algorithms

Cryptography is critical to secure, trustworthy communications. Recent questions within the tech industry have created entirely new discussions about the cryptography underpinning our communications infrastructure. While some in the media have focused on the algorithm chosen for Deterministic Random Bit Generation (DRBG), we’ve seen many more look to have a broader crypto conversation. With this […]

October 17, 2013

SECURITY

Practical Tips for Safekeeping your Mobile Devices

Now when I’m talking about safekeeping a mobile device, I’m not saying don’t use your Kindle by the pool or let your toddler play on the iPad while eating ice cream. These are dangerous things to be doing with a gadget, but today I want to focus more on the data within that device, rather […]

October 16, 2013

SECURITY

Security Awareness and Trust

Now that we're in the midst of October 2013's Cyber Security Awareness Month, it's a good time to think about the connections between security awareness and trust. This discussion centers...

October 16, 2013

SECURITY

A Culture of Transparency

Many Cisco customers with an interest in product security are aware of our security advisories and other publications issued by our Product Security Incident Response Team (PSIRT). That awareness is probably more acute than usual following the recent Cisco IOS Software Security Advisory Bundled Publication on September 25. But many may not be aware of […]

October 16, 2013

SECURITY

One Week After April First, It’s No Joke

April first falls on a Tuesday next year. The following Tuesday is Microsoft’s monthly security update. It will be the last monthly security update for the Windows XP operating system. About one third of the computers with Windows operating systems on the Internet today are still running Windows XP, an operating system almost 15 years […]

October 15, 2013

SECURITY

Mobility: No Longer a Risky Business?

Risk. It’s not just a strategic board game; in business it’s the analysis that determines the potential for loss. In today’s organization, the consumerization of IT has led to groundbreaking developments in the mobility space. The broad deployment of BYOD, coupled with the availability of corporate data and applications, have challenged how we define security. […]

October 15, 2013

SECURITY

Cisco’s onePK Part 2: Reaching out to a Network Element

Exordium In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element. This is staple […]

October 14, 2013

SECURITY

A Financial Service Organization Speaks Out on Secure Access

Are your finances secure with your financial institution? Vystar Credit Union in Florida, USA speaks out on one of their recent efforts to ensure highly secure access at their institution. With the pressures of compliance and the need to protect their institution’s network and assets, Vystar deploys ISE and AnyConnect with great success. Most recently […]

October 10, 2013

SECURITY

Cyber Security Awareness Month 2013: Trust is the Topic

Read, listen, and watch as John Stewart, Senior Vice President and Chief Security Officer at Cisco, espouses the benefits of trustworthy systems and the need for our vendors to hold us accountable for insuring our products meet the requirements of trustworthy systems.

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security