critical infrastructure
The Criticality of the Network in Securing IoT and Critical Infrastructure
Security is the key to the success of any digital project, whether you are connecting critical infrastructure, industrial Internet of Things (IoT), or delivering data and telemetry to reduce costs and increase revenue. We have long advocated the need for a holistic approach to IoT security, and with…
Affirming Trustworthiness of Critical Infrastructure
The network is critical infrastructure for Service Providers. In previous blogs we talked about Cisco’s trustworthy technologies and software innovations in Cisco IOS XR that elevate the trust posture of the Cisco routers. It is imperative to establish a strong infrastructure foundation that preserv…
Securing Critical Infrastructure in the Digital Age
We know adversaries have the expertise and tools necessary to take down critical infrastructure and systems that cripple entire regions. These critical systems are essential to our global economy, physical security, and health. We rely on them to provide electricity in our homes; transportation to w…
Cisco Security: To the Tune of the Dark Side of the Moon
As the days grow shorter and colder, I’m reminded that November is Critical Infrastructure Security and Resilience Month here in the US. According to the Department of Homeland Security, this observance “builds awareness and appreciation of the importance of critical infrastructure and reaffirms the…
Securing Critical Internet Infrastructure: a RPKI case study in Ecuador
Securing critical internet infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September, something exceptional happened in the small South American country of Ecuador: the entire local network operation community got together to be…
Defensive Security: The 95/5 Approach
Many organizations make the error of thinking that basic defensive software is sufficient to protect critical data and infrastructure. When in reality, in order for government and enterprise organizations to keep their data protected from increasingly advanced cyber threats, comprehensive defensive…
1