Defense in Diversity
Security has favored “Defense in Depth” as the dominant strategy. As we enter the world of automated workloads at internet-scale, it is clear that “Defense in Diversity” wins over depth.
Cisco and IBM Security Simplified: Mapping the Story
Cisco and IBM have jointly developed a comprehensive security story, greatly simplifying your vendor and tools landscape.
Embedded switches for custom needs and extreme conditions
From supporting soldiers in the battlefield or first responders at a disaster scene, to maintaining high-value infrastructure, access to highly secure broadband for voice, video, and data communications is critical....
Talos Threat Research Summit at Cisco Live US 2018
Cisco Talos presents a conference by Defenders, for Defenders. Talos had one goal in mind when creating a brand new conference: Make something that we'd want to attend ourselves. As...
Cybersecurity for Defense: Insider Threat Part 1
The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start with, the National Counterintelligence and Security Center defines an inside threat as occurring […]
How To Lose the Cyber Security War in 3 Easy Steps
To defend yourself, you need to stop thinking conventionally and think like a hacker.
Cisco Successfully Demonstrated Secure Mobile Device at Trident Spectre 2016
Last month Cisco was thrilled to participate in the Department of Defense (DoD) Trident Spectre 2016 annual exercise conducted at Joint Expeditionary Base Little Creek-Fort Story, VA. Trident Spectre is an annual event for special operations, intelligence, interagency, and law-enforcement personnel to test and evaluate emerging technologies both from government and commercial industries in tactically-focused […]