National Cyber Security Awareness Month (NCSAM)

September 30, 2019

SECURITY

Our World in Transition and Our Future Demands

October is Cybersecurity Awareness Month and for me, it’s a time to reflect on where we’ve been and how far we’ve come, study the trends and challenges we face today, and look ahead to the next generation of opportunities facing not only the security community, but society at large. In my more than…

September 30, 2019

SECURITY

Threats in encrypted traffic

There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troub…

September 26, 2019

SECURITY

Cisco Security Supporting NATO’s Largest Cybersecurity Conference

NIAS is NATO’s largest cyber security conference and provides an opportunity for NATO and government leaders, defence and cybersecurity specialists to discuss needs and priorities and effective cyber security solutions. NATO’s mission is to protect the freedom of its members. It has innovated and ad…

September 25, 2019

SECURITY

DevSecOps: Blending Critical Operations and Cultures to Increase Data Security

Two major shifts are affecting organizational cybersecurity posture: digital product and service offerings are increasingly powered by mobile, cloud and data analytics; while developers of those products and services are migrating to Development Operations (DevOps) processes for greater agility and…

September 25, 2019

DEVELOPER

Best Practices for Using Cisco Security APIs

Like programming best practices, growing your organization’s use of Application Programming Interfaces (APIs) comes with its own complexities. This blog post will highlight three best practices for ensuring an effective and efficient codebase. Additionally, a few notable examples from Cisco DevNet a…

September 25, 2019

SECURITY

The Criticality of the Network in Securing IoT and Critical Infrastructure

Security is the key to the success of any digital project, whether you are connecting critical infrastructure, industrial Internet of Things (IoT), or delivering data and telemetry to reduce costs and increase revenue. We have long advocated the need for a holistic approach to IoT security, and with…

September 24, 2019

SECURITY

The Circus is Coming to Town and Why You Should Stay Away

We are entering the integrated era You’ve probably noticed the recent headlines of a few one-trick ponies getting together to form their own three ring circus.  These events underscore a paradigm shift that is underway – the security world is entering the integrated era.  Nowadays, customers want co…

October 29, 2018

GOVERNMENT

Cybersecurity: A spooky tech-tale for Halloween

In the world of government cybersecurity, ghosts and goblins often take a different form. An innocent looking email, a nondescript USB drive, or even a seemingly helpful bot. Each can serve as a harbinger of doom, delivering destructive malware that leaves your network in disarray. So as the ghosts…

October 24, 2018

SECURITY

Tackling the Growing Threat Landscape of ICS and the IIoT

It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether or not a device or sensor is digitally connected. Today’s focus must be on who has access to the operatio…