By Panos Kampanakis Quantum-resistant crypto Recently there has been great media attention on Quantum Computers (QC) and their potential impact on current cryptography standards. We blogged about it in 2015. All of this attention has drawn out critical efforts from many in academia and industry to solve problems with today’s cryptography that would break in a post quantum […]

Source:: Cisco Security Notice

By Panos Kampanakis Quantum-resistant crypto Recently there has been great media attention on Quantum Computers (QC) and their potential impact on current cryptography standards. We blogged about it in 2015. All of this attention has drawn out critical efforts from many in academia and industry to solve problems with today’s cryptography that would break in a post quantum […]

Source:: Cisco Security Notice

Source:: Innovaphone

Source:: Innovaphone

By Matthew Robertson Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through the effective monitoring of the policy once the policy is implemented. Through the collection and analysis of NetFlow data from the network infrastructure Cisco Stealthwatch […]

Source:: Cisco Security Notice