December 27, 2017


The Impact on Network Security Through Encrypted Protocols – QUIC

3 min read

QUIC stands for Quick UDP Internet Connections, an experimental protocol designed and deployed by Google.

September 11, 2017


Who’s Afraid of Modernization?

2 min read

Everybody knows that modernizing legacy systems brings better security along with all of the other improvements in power and efficiency. It seems, however, that despite what everybody knows, a large...

September 6, 2017


Prevent an Encryption Bottleneck on High-Speed Links

2 min read

Common encryption security protocols can slow down high-speed network links, but there is an alternative that lets them fly.

July 5, 2017


Collaboration at #CLUS, Final Wrap: “Ahh, the Cloud” and Endangered Chickens

4 min read

The final day of Cisco Live US didn’t disappoint. The week closed with a full agenda of sessions, innovation talks, and – of course – the celebrity keynote. Collaboration VP and CTO Jonathan Rosenberg made a room full of people nervous – on purpose. The session title probably provided a clue: “Worried About Putting Your Data in the Cloud? Good, You Should Be.” Speaking of nervous people, Bryan Cranston's celebrity keynote had a strange (and hilarious) focus on the fate of farmyard chickens.

June 23, 2017


Detecting Encrypted Malware Traffic (Without Decryption)

7 min read

Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.

June 22, 2017


What is the Body Language of Your Encrypted Network Traffic Really Saying?

3 min read

The rise of encrypted traffic is changing the threat landscape; the increase in digital business has increased the number of services using encrypted traffic to secure information.

December 2, 2016


From DRM technology to a working content protection system

2 min read

When it comes to over-the-top (OTT) video distribution, we are seeing many of our customers opt for a multi-DRM approach. This means utilizing the DRM client that is pre-integrated into the viewing platform instead of installing a DRM. These natively available DRMs – the native DRMs – are developed and deployed by Microsoft, Google and Apple […]

June 20, 2016


Cisco Successfully Demonstrated Secure Mobile Device at Trident Spectre 2016

1 min read

Last month Cisco was thrilled to participate in the Department of Defense (DoD) Trident Spectre 2016 annual exercise conducted at Joint Expeditionary Base Little Creek-Fort Story, VA. Trident Spectre is an annual event for special operations, intelligence, interagency, and law-enforcement personnel to test and evaluate emerging technologies both from government and commercial industries in tactically-focused […]