S&TO
Can you hire your way to security resilience?
Proven strategies to implement into your security culture that can have a big impact on both your hiring and retention practices.
Building Consumer Confidence Through Transparency and Control
The Cisco 2021 Consumer Privacy Survey explores what individuals are doing to protect their privacy, impact of regulations, attitudes on pandemic-related data and use of personal information in Artificial Intelligence.
The Need for Continuous and Dynamic Threat Modeling
The trend towards accelerated application development, regularly updating the architecture through an agile methodology, led us to strategize ways to continuously, and dynamically, threat model an application architecture during runtime.
Test Automation for Application Security
After an application is developed, multiple security tests must be run to ensure it’s ready for deployment. Learn how Cisco validates its software based on industry and internal security standards.
Third-Party Software Security Scanning
Third-party software is ubiquitous across product development. With it grows the interest for more accurate visibility, accounting of open source and commercial components, and for proper management and hygiene.
Growing the Next Generation of Cybersecurity Talent
Cybersecurity is a team sport. When a community rises, we all rise. We are honored to support programs that ensure the next generation rises with cybersecurity expertise.
A Framework for Continuous Security
Maintaining the resiliency of data, assets, systems, and the network is mission-critical. DevOps must continuously improve resiliency with application security tools that automate security posture assessment and manage security risks.
Embedding Trust at the Core of Critical Infrastructure
Embedding trust and resilience into critical infrastructure is a moving target. We must focus on the trustworthiness and integrity of the technology and processes that run these critical systems.
Find Your Resilience in Trusted Partners
Many organizations are taking on cyber risk driven by current disruption and the pressure to ‘keep things going.’ We must ensure our new technology dependence is appropriately understood and managed.
1