Trustworthy Networking is Not Just Technological, It’s Cultural
With the multitude of dangers constantly testing networks, there should be no such concept of “implicit trust”. At the core of the defensive network is the principle of proven trustworthy hardware and software, working in conjunction to protect network devices, data, and applications from attacks.
XR7, Not Just Another Release
Find out why IOS XR7 is more than just a mere new release — Its noteworthy evolutions make it simple, modern, trustworthy, and cloud-enhanced.
Cisco 8000 Series Powering the Internet for the Future
Learn more about our brand-new routing systems - the Cisco 8000 Series
Affirming Trustworthiness of Critical Infrastructure
How do you establish a strong infrastructure foundation that preserves integrity and reinforces trust? We'll show you how to cryptographically gather evidence to affirm trustworthiness of your trusted network.
For Data Center Security, It’s Not ‘Trust, but Verify’, Verify Again, and then Trust
According to the Cisco 2017 Annual Security Report, security attacks on businesses have significant consequences with nearly quarter of these companies suffering lost business opportunities, 20 percent of them losing customers, and more than 30 percent of them losing revenue. For example, the recent rash of ransomware attacks around the globe are expected to cost […]
The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies
This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity. Cisco has […]
Building in Security from the Ground Up with The Cisco Secure Development Lifecycle
At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices. That’s why Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development […]
Cyber Security Awareness Month 2013: Trust is the Topic
Read, listen, and watch as John Stewart, Senior Vice President and Chief Security Officer at Cisco, espouses the benefits of trustworthy systems and the need for our vendors to hold us accountable for insuring our products meet the requirements of trustworthy systems.