Towards Backward-Compatible Post-Quantum Certificate Authentication
Quantum computers would pose a threat to PKI algorithms and systems as we know today.
Quantum computers would pose a threat to PKI algorithms and systems as we know today.
When I started working on the Cisco Secure Development Lifecycle, I was the only woman in a group of over fifty men.
Working together to bridge the cybersecurity talent gap at the Women in Cybersecurity Conference (WiCyS) on March 22-24 in Chicago!
This is Part 3 in our Four Part DevSecOps Blog Series In Part 2 of this blog series, DevSecOps - Security at the Speed of Business, we explained the...
I like to say that I didn’t really choose a career in cybersecurity – it chose me. The field naturally suits my personality, which has always been safety conscious. My...
In Part One of this blog series DevSecOps - Win Win for All, we established a foundation for DevSecOps practices with our Cloud Security Manifesto. In Part 2 of this series, we will describe another key aspect of DevSecOps – developing security
With just three months to go until the General Data Protection Regulation (GDPR) becomes enforceable on May 25, most global companies are racing toprepare. We all want to avoid the...
It’s no surprise the world is going digital. With this transition comes the opportunity for economic growth, job creation and global competitiveness but also the risk of cyber-attacks for monetary...
Today’s savvy customers are paying more attention to the data privacy features of the products and services they buy. They want to know what data is captured, how it is...