trustworthy systems

Affirming Trustworthiness of Critical Infrastructure

How do you establish a strong infrastructure foundation that preserves integrity and reinforces trust? We'll show you how to cryptographically gather evidence to affirm trustworthiness of your trusted network.

July 17, 2017

DATA CENTER

For Data Center Security, It’s Not ‘Trust, but Verify’, Verify Again, and then Trust

According to the Cisco 2017 Annual Security Report, security attacks on businesses have significant consequences with nearly quarter of these companies suffering lost business opportunities, 20 percent of them losing customers, and more than 30 percent of them losing revenue. For example, the recent rash of ransomware attacks around the globe are expected to cost […]

October 8, 2015

SECURITY

Cybersecurity: The Holistic Trust Approach

In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco,...

July 27, 2015

SECURITY

The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies

This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity. Cisco has […]

April 14, 2014

SECURITY

Building in Security from the Ground Up with The Cisco Secure Development Lifecycle

At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices. That’s why Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development […]

October 10, 2013

SECURITY

Cyber Security Awareness Month 2013: Trust is the Topic

Read, listen, and watch as John Stewart, Senior Vice President and Chief Security Officer at Cisco, espouses the benefits of trustworthy systems and the need for our vendors to hold us accountable for insuring our products meet the requirements of trustworthy systems.

April 3, 2013

SECURITY

Security Geeks and Wonks Unite!

Are we heading to a day of reckoning, where the forces of cyber crime overwhelm and erase the good things that information technology delivers? If we head down our current path of incremental, individualized approaches to cyber security, the answer is “Yes.” But I’m enough of an optimist to think that if the IT and security geeks and wonks of the world can unite, share information, work hard, and not worry about who gets the credit, we stand a fighting chance.

March 1, 2013

SECURITY

Transparency, Transparency, Transparency, and Trustworthy Systems

Cisco's Senior Vice President and Chief Security Officer, John Stewart discusses - in both words and video - the importance of Trustworthy Systems for Cisco's customers and the efforts being put forth by Cisco to insure that we listen to our customers and provide products that possess robustness and integrity.