trustworthy systems
XR7, Not Just Another Release
When IOS XR was first designed, mass-scale networking and its related challenges were not around. However, we already had a clear vision of building a highly scalable, reliable, available, upgradeable, high-performance NOS for the service provider space that caters all the way from low-end single c…
Cisco 8000 Series Powering the Internet for the Future
On December 11th 2019, Cisco announced a set of new offerings – silicon, optics, software, and routing systems – specifically designed to power the Internet for the future. In my time at Cisco, I’ve had the privilege of launching a few notable routing systems – the ASR 9000, the NCS 6000…
Affirming Trustworthiness of Critical Infrastructure
The network is critical infrastructure for Service Providers. In previous blogs we talked about Cisco’s trustworthy technologies and software innovations in Cisco IOS XR that elevate the trust posture of the Cisco routers. It is imperative to establish a strong infrastructure foundation that preserv…
For Data Center Security, It’s Not ‘Trust, but Verify’, Verify Again, and then Trust
According to the Cisco 2017 Annual Security Report, security attacks on businesses have significant consequences with nearly quarter of these companies suffering lost business opportunities, 20 percent of them losing customers, and more than 30 percent of them losing revenue. For example, the recent…
Cybersecurity: The Holistic Trust Approach
In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco, its customers, products, services and partners, we have embarked on a journey to build security and trust into every asp…
The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies
This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security res…
Building in Security from the Ground Up with The Cisco Secure Development Lifecycle
At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices. That’s why Cisco created the Cisco Secure Development Lifecycle (Cisco…
Cyber Security Awareness Month 2013: Trust is the Topic
With October designated as Cyber Security Awareness Month, it got me thinking about the connections between awareness and trust. Cisco has made significant investments in what we call “Trustworthy Systems.” These products and services integrate security features, functions, and design practices from…
Security Geeks and Wonks Unite!
Are we heading to a day of reckoning, where the forces of cyber crime overwhelm and erase the good things that information technology delivers? If we head down our current path of incremental, individualized approaches to cyber security, the answer is “Yes.” But I’m enough of an optimist to think th…
2