Cisco Security and Trust Organization

May 2, 2016

SECURITY

5 Steps to an Effective Data Incident Response Program

All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]

February 25, 2016

SECURITY

The First Law of IoT: Things that Can Be Connected, Will Be Connected

Recently, I had the opportunity to participate on a panel discussion of Internet of Things (IoT) privacy and security at the Consumer Electronics Show in Las Vegas. This week, Barcelona plays host to the 2016 Mobile World Congress, where technology leaders convene to discuss what’s next in the mobile industry. Both events point to a […]

February 24, 2016

SECURITY

Here, There & Everywhere – Harnessing Your Value Chain Security Beast!

Security threats are varied and often unpredictable. We are faced with an expanding attack surface. Adversaries abound, spanning organized crime, nation-states and malicious insiders. It is against this backdrop that...

February 1, 2016

SECURITY

Are you protecting your organization with comprehensive security and trust?

With cyber threats escalating, security has emerged as a critical business driver and competitive differentiator. Organizations that successfully embed security throughout their network infrastructure, policies, processes, and culture are able to reduce risk while creating sustainable business advantage. At CiscoLive Berlin this year, we will examine how Cisco is building foundational security into the underlying […]

January 28, 2016

SECURITY

Respecting Privacy, Safeguarding Data and Enabling Trust

Data Privacy Day is January 28, and this year’s theme examines issues around respecting privacy, protecting data and enabling trust. Today more than ever, any global company is a digitized company, which means that every company is grappling with challenges around privacy, security and trust. As a result, these challenges are no longer an IT-only […]

January 21, 2016

SECURITY

Why Aging Infrastructure Is a Growing Problem

Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco […]

December 21, 2015

SECURITY

Update for Customers

Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com Our development practices […]

December 4, 2015

SECURITY

For Value Chain Security Collaboration, Use a Carrot With Your Stick

The Digital Economy is transforming the way that organizations operate. Deploying a secure, trustworthy infrastructure is no longer enough. Security must be designed into all facets of an enterprise’s network and its third party ecosystem. At the same time, enterprises of all sizes must shrink the attack surface. And, foster an open, security-aware culture, internally and […]

November 18, 2015

SECURITY

Introducing the Cisco Technology Verification Service

Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this journey more than 10 years ago […]