critical infrastructure

September 25, 2019

SECURITY

The Criticality of the Network in Securing IoT and Critical Infrastructure

To demonstrate the vital role of the network in IoT Security, we explore how it can help us tackle a series of IoT-related security challenges.

Affirming Trustworthiness of Critical Infrastructure

How do you establish a strong infrastructure foundation that preserves integrity and reinforces trust? We'll show you how to cryptographically gather evidence to affirm trustworthiness of your trusted network.

September 26, 2018

SECURITY

Securing Critical Infrastructure in the Digital Age

In order for critical infrastructure to be ready to take on the cyber risks of today (and tomorrow) will require a holistic strategy.

November 14, 2016

SECURITY

Cisco Security: To the Tune of the Dark Side of the Moon

As the days grow shorter and colder, I’m reminded that November is Critical Infrastructure Security and Resilience Month here in the US. According to the Department of Homeland Security, this observance “builds awareness and appreciation of the importance of critical infrastructure and reaffirms the nationwide commitment to keep our critical infrastructure and our communities safe […]

November 22, 2013

SECURITY

Securing Critical Internet Infrastructure: a RPKI case study in Ecuador

Securing critical internet infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September, something exceptional happened in the small South American country of Ecuador: the entire local network operation community got together to be pioneers in securing the local Internet infrastructure by registering its networks in the RPKI system and […]

October 21, 2013

SECURITY

Defensive Security: The 95/5 Approach

Many organizations make the error of thinking that basic defensive software is sufficient to protect critical data and infrastructure. When in reality, in order for government and enterprise organizations to keep their data protected from increasingly advanced cyber threats, comprehensive defensive security approaches are critical. And even with advanced, comprehensive solutions, there are still risks. […]