The Next Generation of Defence Networks and Security
National security is critical topic and top of mind for every country. Learn more about a research collaboration out of Australia that provides a view into the next generation of defence networks, technology infrastructure and security.
Defense in Diversity
Security has favored “Defense in Depth” as the dominant strategy. As we enter the world of automated workloads at internet-scale, it is clear that “Defense in Diversity” wins over depth.
Cisco and IBM Security Simplified: Mapping the Story
Cisco and IBM have jointly developed a comprehensive security story, greatly simplifying your vendor and tools landscape.
AI/ML: Shiny Object or Panacea?
Guest Blogger: Anthony McKinney Data Center Specialist Army Tactical/SOF Collaborator: Michelle Tschudy, US Public Sector/DoD You can’t swing...
Embedded switches for custom needs and extreme conditions
From supporting soldiers in the battlefield or first responders at a disaster scene, to maintaining high-value infrastructure, access to highly secure broadband for voice, video, and data communications is critical....
Talos Threat Research Summit at Cisco Live US 2018
Cisco Talos presents a conference by Defenders, for Defenders. Talos had one goal in mind when creating a brand new conference: Make something that we'd want to attend ourselves. As...
Welcome to Cybersecurity in Public Sector
It’s like the scene in a movie when the good guy pulls out a knife thinking he has the upper hand over the villain…. and out of nowhere the bad...
Cybersecurity for Defense: Insider Threat Part 1
The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start with, the National Counterintelligence and Security Center defines an inside threat as occurring […]
How To Lose the Cyber Security War in 3 Easy Steps
To defend yourself, you need to stop thinking conventionally and think like a hacker.