Human-Machine Interactions of the Future: Unpopular Opinions [Part 3]
Cisco Futurist Annie Hardy expands on the future of human-machine interaction in Part 3 of her Unpopular Opinions series. In this installment, find out why decentralization may not be as decentralized as many might hope for.
Human-Machine Interactions of the Future: Unpopular Opinions [Part 2]
Cisco Futurist Annie Hardy expands on the future of human-machine interaction in Part 2 of her Unpopular Opinions series, explaining her vision of what the Metaverse (or Metaverses) will look like, why many aren't buying into the full adoption of Web3, and more.
Human-Machine Interactions of the Future: Unpopular Opinions [Part 1]
Cisco Futurist Annie Hardy lays the foundation for understanding the terms, trends, and buzz behind the Metaverse and Web3 in the first blog in her series on the future of human-machine interaction.
Towards Backward-Compatible Post-Quantum Certificate Authentication
Quantum computers would pose a threat to PKI algorithms and systems as we know today.
Cisco Cloud Services Platform 2100 and Cavium LiquidSecurity™ enable secure Crypto as a Service solution for NFV, Clou …
Cisco and Cavium, Inc., a leading provider of semiconductor products that enable secure and intelligent processing for enterprise, data center, cloud, wired and wireless networking, today are announcing that Cisco is integrating Cavium’s LiquidSecurity™ family into the Cisco Cloud Services Platform (CSP) 2100. The CSP 2100 is a Network Functions Virtualization (NFV) turn-key & open […]
Cybersecurity in the Post-Quantum Era
One of the great scientific challenges of our time is the construction of a practical quantum computer. Operating using the counterintuitive principles of quantum physics, such a device could rapidly explore an vast number of possible states. It could perform computational tasks that are far beyond our current capabilities, such as modeling molecules and designing […]
In Search of The First Transaction
At the height of an eventful week – Cloud and IoT developments, Open Source Think Tank, Linux Foundation Summit – I learned about the fate of my fellow alumnus, an upperclassman as it were, the brilliant open source developer and crypto genius known for the first transaction on Bitcoin. Hal Finney is a Caltech graduate who went […]
David McGrew Discusses Legacy Encryption Solutions with Mike Danseglio of 1105 Media at RSA 2013
Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can't keep up with current advances in hacking and brute force computing power. Additionally, legacy solutions are increasingly inefficient as security levels rise, and perform poorly at high data rates. In order to stay ahead of this challenge, encryption needs to evolve.