Cisco Radio Aware Routing
A full featured router-based implementation of RFC 5578 and RFC 8175 that delivers reliable and efficient converged voice, video, and data solutions for networks on the move.
Log4Shell: Cisco Presents Testimony to Senate Homeland Security and Governmental Affairs Committee
Cisco's Brad Arkin provided testimony to the U.S. Senate Homeland Security and Governmental Affairs Committee regarding Cisco’s remediation of the #Log4Shell vulnerability. Read more on how Cisco responded to protect our enterprise and customers.
The Next Generation of Defence Networks and Security
National security is critical topic and top of mind for every country. Learn more about a research collaboration out of Australia that provides a view into the next generation of defence networks, technology infrastructure and security.
Defense in Diversity
Security has favored “Defense in Depth” as the dominant strategy. As we enter the world of automated workloads at internet-scale, it is clear that “Defense in Diversity” wins over depth.
Cisco and IBM Security Simplified: Mapping the Story
Cisco and IBM have jointly developed a comprehensive security story, greatly simplifying your vendor and tools landscape.
Embedded switches for custom needs and extreme conditions
From supporting soldiers in the battlefield or first responders at a disaster scene, to maintaining high-value infrastructure, access to highly secure broadband for voice, video, and data communications is critical....
Talos Threat Research Summit at Cisco Live US 2018
Cisco Talos presents a conference by Defenders, for Defenders. Talos had one goal in mind when creating a brand new conference: Make something that we'd want to attend ourselves. As...
Welcome to Cybersecurity in Public Sector
It’s like the scene in a movie when the good guy pulls out a knife thinking he has the upper hand over the villain…. and out of nowhere the bad...
Cybersecurity for Defense: Insider Threat Part 1
The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start with, the National Counterintelligence and Security Center defines an inside threat as occurring […]