Post-quantum MACsec in Cisco switches
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. Our research shows the
Episode 3 of our Security Stories podcast is now live, and you won't want to miss our interview with the amazing Theresa Payton. From life inside The White House, to online privacy, to how to recruit for cybersecurity roles, it really is a fascinating
Learn how Cisco Endpoint Security Analytics (CESA) helps alleviate VPN bandwidth constraints while improving endpoint security for remote work deployments.
Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes...
Your destiny is determined by your decisions. Great decisions are made by asking the right questions. Make them count with Cisco SecureX- the industries broadest security platform that unifies visibility, enables automation, & simplifies security.
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 3 and Apr 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats
Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms. See results.
Today's data centers are rapidly evolving with applications. This boosts the value of the data center, but also introduces security challenges. To address these concerns, organizations are now approaching data center security uniquely.
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services