Articles
DevSecOps: Lessons Learned
This is Part 4 in our Four Part DevSecOps Blog Series In Part 3 of our blog series DevSecOps: Automation for Assurance, we covered our automation journey to help us scale security across hundreds of development teams via our Continuous Security Buddy (CSB) capabilities. In the final blog of this ser…
DevSecOps: Automation for Assurance
This is Part 3 in our Four Part DevSecOps Blog Series In Part 2 of this blog series, DevSecOps – Security at the Speed of Business, we explained the “what” and “why” of our security guardrails and the Agile Hackathon method used to develop these guardrails, which enable…
DevSecOps: Security at the Speed of Business
[This is part two of a four-part blog series about DevSecOps.] In Part One of this blog series DevSecOps – Win Win for All, we established a foundation for DevSecOps practices with our Cloud Security Manifesto. In Part 2 of this series, we will describe another key aspect of DevSecOps – develo…
DevSecOps: Win-Win for All
[This is part one of a four-part blog series about DevSecOps.] Today, companies are transforming their business to offer customers connected digital experiences where products and services are increasingly powered by mobile, cloud and data analytics capabilities. Developers in turn are moving to De…
For Women in Cybersecurity, Possibilities are Endless
This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and Michelle Dennedy, Chief Privacy Officer. When the public thinks of cybersecurity we often envision people sitting in dark roo…
Security Blog Story – Part 4: Lessons Learned
Editor’s Note: This is the final installment of a four-part series featuring an in-depth overview of InfoSec’s (Information Security) Unified Security Metrics Program (USM). In this blog entry, we discuss some of the lessons learned during the program’s first year. Winter weather i…
Making Your Metrics Program Effective Beyond Just Charts and Numbers
Editor’s Note: This is the third part of a four-part series featuring an in-depth overview of Infosec’s (Information Security) Unified Security Metrics Program (USM). In this installment, we discuss the effectiveness of the USM program at Cisco. Information security is all about risk red…
Security Metrics Starting Point: Where to Begin?
Editor’s Note: This is the second part of a four-part series featuring an in-depth overview of Infosec’s (Information Security) Unified Security Metrics Program. In this second installment, we discuss where to begin measuring. H. James Harrington, noted author of Business Process Improve…
No Curve Ball Here, Unified Security Metrics Deliver Meaningful Results
Editor’s Note: This is the first part of a four-part series featuring an in-depth overview of Infosec’s (Information Security) Unified Security Metrics Program. In this first installment, we discuss the value of security metrics at Cisco. What does the film Moneyball have in common with security me…
1