Affirming Trustworthiness of Critical Infrastructure
How do you establish a strong infrastructure foundation that preserves integrity and reinforces trust? We'll show you how to cryptographically gather evidence to affirm trustworthiness of your trusted network.
For Data Center Security, It’s Not ‘Trust, but Verify’, Verify Again, and then Trust
According to the Cisco 2017 Annual Security Report, security attacks on businesses have significant consequences with nearly quarter of these companies suffering lost business opportunities, 20 percent of them losing customers, and more than 30 percent of them losing revenue. For example, the recent rash of ransomware attacks around the globe are expected to cost […]
The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies
This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity. Cisco has […]
Building in Security from the Ground Up with The Cisco Secure Development Lifecycle
At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices. That’s why Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development […]
Cyber Security Awareness Month 2013: Trust is the Topic
Read, listen, and watch as John Stewart, Senior Vice President and Chief Security Officer at Cisco, espouses the benefits of trustworthy systems and the need for our vendors to hold us accountable for insuring our products meet the requirements of trustworthy systems.
Security Geeks and Wonks Unite!
Are we heading to a day of reckoning, where the forces of cyber crime overwhelm and erase the good things that information technology delivers? If we head down our current path of incremental, individualized approaches to cyber security, the answer is “Yes.” But I’m enough of an optimist to think that if the IT and security geeks and wonks of the world can unite, share information, work hard, and not worry about who gets the credit, we stand a fighting chance.
Transparency, Transparency, Transparency, and Trustworthy Systems
Cisco's Senior Vice President and Chief Security Officer, John Stewart discusses - in both words and video - the importance of Trustworthy Systems for Cisco's customers and the efforts being put forth by Cisco to insure that we listen to our customers and provide products that possess robustness and integrity.