The Need for Continuous and Dynamic Threat Modeling
The trend towards accelerated application development, regularly updating the architecture through an agile methodology, led us to strategize ways to continuously, and dynamically, threat model an application architecture during runtime.
Test Automation for Application Security
After an application is developed, multiple security tests must be run to ensure it’s ready for deployment. Learn how Cisco validates its software based on industry and internal security standards.
Growing the Next Generation of Cybersecurity Talent
Cybersecurity is a team sport. When a community rises, we all rise. We are honored to support programs that ensure the next generation rises with cybersecurity expertise.
A Framework for Continuous Security
Maintaining the resiliency of data, assets, systems, and the network is mission-critical. DevOps must continuously improve resiliency with application security tools that automate security posture assessment and manage security risks.
Embedding Trust at the Core of Critical Infrastructure
Embedding trust and resilience into critical infrastructure is a moving target. We must focus on the trustworthiness and integrity of the technology and processes that run these critical systems.
Find Your Resilience in Trusted Partners
Many organizations are taking on cyber risk driven by current disruption and the pressure to ‘keep things going.’ We must ensure our new technology dependence is appropriately understood and managed.
Post-Quantum TLS 1.3 and SSH Performance (preliminary results)
So far, the industry has been testing post-quantum key exchange and authentication separately in a quest for a quantum-secure future. We recently have been experimenting with TLS and SSH using both post-quantum key exchange and authentication. The preliminary results are promising for some algorithms.