encryption
Focus on HyperFlex: Encryption, built-in from the ground up
2 min read
When designing Cisco HyperFlex we took a holistic approach that uses industry-standard, strong encryption at the component, system and cluster levels – built-in since day one.
Letter from Oslo: The NDC Security 2022 Conference
5 min read
When you find yourself on a business trip and forget the code to your corporate AmEx, you know you haven’t been on the road for a while. NDC Security was a great way to get myself back into the conference configuration. I learned a lot at this show and had a great time giving two talks.
Future Focused: A Safer Way to Expose Private Server Names
2 min read
Working to stay ahead of bad actors and keep our costumers secure is our priority, that's why we’re exploring a safer way to publicly advertise private services within an organization. It’s a concept we’re calling Auth-DoH.
Future Focused: Encryption and Visibility Can Co-Exist
3 min read
Privacy and security are in constant tension. Hiding internet activity strengthens privacy—but also makes it easier for bad actors to infiltrate the network.
Post-quantum MACsec in Cisco switches
2 min read
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
Admins Achieve More With Webex: Reduce Cost By Integrating with Microsoft IT Tools and Enjoy Webex Native Security Capab …
4 min read
At Cisco, we are continually investing in capabilities and partnerships to ensure industry defining collaboration security and compliance capabilities.
Cisco Webex – Building and Maintaining Trust with Collaboration Administrators
4 min read
Building and Maintaining Trust with Collaboration Administrators starts with a platform that provides simple and efficient administration, rich business insight and powerful troubleshooting tools.
Putting the “Trust” in Trustworthy SD-WAN
6 min read
With ever-more sophisticated threats, network operators must be able to trust that the hardware and software that comprise their infrastructure are genuine, uncompromised, and operating as intended.
Fighting for Encryption & Security Around the World
2 min read
Last week, my colleagues Tim Fawcett, Matt Carling and I had the honour and pleasure of representing Cisco in a hearing before theAustralian Parliamentary Joint Committee on Intelligence and Security....