critical infrastructure

September 25, 2019

SECURITY

The Criticality of the Network in Securing IoT and Critical Infrastructure

Security is the key to the success of any digital project, whether you are connecting critical infrastructure, industrial Internet of Things (IoT), or delivering data and telemetry to reduce costs and increase revenue. We have long advocated the need for a holistic approach to IoT security, and with…

Affirming Trustworthiness of Critical Infrastructure

The network is critical infrastructure for Service Providers. In previous blogs we talked about Cisco’s trustworthy technologies and software innovations in Cisco IOS XR that elevate the trust posture of the Cisco routers. It is imperative to establish a strong infrastructure foundation that preserv…

September 26, 2018

SECURITY

Securing Critical Infrastructure in the Digital Age

We know adversaries have the expertise and tools necessary to take down critical infrastructure and systems that cripple entire regions. These critical systems are essential to our global economy, physical security, and health. We rely on them to provide electricity in our homes; transportation to w…

November 14, 2016

SECURITY

Cisco Security: To the Tune of the Dark Side of the Moon

As the days grow shorter and colder, I’m reminded that November is Critical Infrastructure Security and Resilience Month here in the US. According to the Department of Homeland Security, this observance “builds awareness and appreciation of the importance of critical infrastructure and reaffirms the…

November 22, 2013

SECURITY

Securing Critical Internet Infrastructure: a RPKI case study in Ecuador

Securing critical internet infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September, something exceptional happened in the small South American country of Ecuador: the entire local network operation community got together to be…

October 21, 2013

SECURITY

Defensive Security: The 95/5 Approach

Many organizations make the error of thinking that basic defensive software is sufficient to protect critical data and infrastructure. When in reality, in order for government and enterprise organizations to keep their data protected from increasingly advanced cyber threats, comprehensive defensive…