S&TO
Joining the Charter of Trust
Today, I had the honor of representing Cisco as we officially joined the Charter of Trust Initiative. The Charter consists of multiple global organizations working together to outline key cybersecurity principles for establishing a new charter of trust between society, world governments, business pa…
Enrolling More Women in Cyber Engineering
Everyone who works at Cisco knows that we encourage, promote and value a diverse workforce. Supporting women is an important part of that effort. The difference in tangible support from ten years ago to today is profound across the company; but I truly believe that the Security & Trust Organizat…
DevSecOps: Lessons Learned
This is Part 4 in our Four Part DevSecOps Blog Series In Part 3 of our blog series DevSecOps: Automation for Assurance, we covered our automation journey to help us scale security across hundreds of development teams via our Continuous Security Buddy (CSB) capabilities. In the final blog of this ser…
Towards Backward-Compatible Post-Quantum Certificate Authentication
We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been focusing on quantum-resistant hash-based signatures for a few years now with LMS and SPHINCS+ and more. NIS…
The Cybersecurity Journey – Always Changing, Always Growing
I’m going to write a book called Organic Cyber Security. A career in this continually evolving field must be just that: organic. It has to become part of your daily practice! You need the right spark to get interested, learn the basics, and you’re off! That’s an especially important notion for women…
Standing with WiCyS 2018!
Working together to bridge the cybersecurity talent gap We’re excited for this week’s Women in Cybersecurity Conference (WiCyS) on March 22-24 in Chicago! The Conference is driven by the U.S. National Science Foundation’s Women in Cyber Security initiative, started in 2013 by Dr. Ambareen Siraj to…
DevSecOps: Automation for Assurance
This is Part 3 in our Four Part DevSecOps Blog Series In Part 2 of this blog series, DevSecOps – Security at the Speed of Business, we explained the “what” and “why” of our security guardrails and the Agile Hackathon method used to develop these guardrails, which enable…
Curiosity, Exploration and Community – How I Paved my Own Path to a Cybersecurity Career
I like to say that I didn’t really choose a career in cybersecurity – it chose me. The field naturally suits my personality, which has always been safety conscious. My cybersecurity journey began at Georgia Tech Research Institute, where my work exposed me to the challenges of using electronic syste…
DevSecOps: Security at the Speed of Business
[This is part two of a four-part blog series about DevSecOps.] In Part One of this blog series DevSecOps – Win Win for All, we established a foundation for DevSecOps practices with our Cloud Security Manifesto. In Part 2 of this series, we will describe another key aspect of DevSecOps – develo…