Post-Quantum TLS 1.3 and SSH Performance (preliminary results)
So far, the industry has been testing post-quantum key exchange and authentication separately in a quest for a quantum-secure future. We recently have been experimenting with TLS and SSH using both post-quantum key exchange and authentication. The preliminary results are promising for some algorithms.
Post-quantum MACsec in Cisco switches
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
Promising Results for Post-Quantum Certificates in TLS 1.3
Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms. See results.
Cisco Wins Global Excellence for Cybersecurity Education and Awareness
This award for our Keep Cisco Safe campaign represents our relentless effort to drive pervasive security, trust, data protection, and privacy into everything we do at Cisco.
From Privacy to Trust and ROI
The latest Cisco Data Privacy Benchmark Study provides groundbreaking research and insights on keeping data safe, earning customer trust and maximizing investments in data privacy.
A New Day for Critical Infrastructure Security & Resilience
It’s a new Day for National Critical Infrastructure Security and Resilience. While November is recognized as the month focused on this issue in the U.S., for some time, digital transformation has widened the aperture of our lens dramatically.
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure the connected devices are acting as intended?
Cisco Advances Communications Security with Completion of Automated Cryptographic Validation Protocol Testing
We assume our communications are secure. But are they? Cryptography provides the foundation of secure communications, but how to know if that cryptography is correct and secure?