The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies

By Anthony Grieco This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity. Cisco has hundreds of dedicated security engineers and researchers throughout the company and around the globe, who use the latest and greatest tools and techniques to test []

Source:: Cisco Security Notice

Securing the Supply Chain Throughout the Product Lifecycle

By Edna Conway In this environment of advanced threats along every point of the value chain, I’d like to talk about what it means for you, our customers and partners, to have supply chain security throughout the product lifecycle. I’ve just finished a short video on this topic. I’d love to hear your feedback, insights and suggestions on securing the product supply chain. At Cisco, we are focused on three primary threats to the supply chain that can affect our solutions: manipulation, espionage []

Source:: Cisco Security Notice

Securing the Supply Chain Throughout the Product Lifecycle

By Edna Conway In this environment of advanced threats along every point of the value chain, I’d like to talk about what it means for you, our customers and partners, to have supply chain security throughout the product lifecycle. I’ve just finished a short video on this topic. I’d love to hear your feedback, insights and suggestions on securing the product supply chain. At Cisco, we are focused on three primary threats to the supply chain that can affect our solutions: manipulation, espionage []

Source:: Cisco Security Notice

Fortinet Earns Rigorous Common Criteria Certification, Further Solidifying Its Commitment to Protecting Public Sector Customers

Fortinet Earns Rigorous Common Criteria Certification, Further Solidifying Its Commitment to Protecting Public Sector Customers

Source:: Fortinet

Fortinet Earns Rigorous Common Criteria Certification, Further Solidifying Its Commitment to Protecting Public Sector Customers

Fortinet Earns Rigorous Common Criteria Certification, Further Solidifying Its Commitment to Protecting Public Sector Customers

Source:: Fortinet

Security and the Board

By Stuart Broderick Not long ago I was asked to attend a quarterly Board meeting of one of my healthcare clients and to present the recommendations of a Strategic Security Roadmap (SSR) exercise that my team and I had conducted for the organization. The meeting commenced sharply at 6am one weekday morning and I was allocated the last ten minutes to explain our recommendations and proposed structure for a revised Cybersecurity Management Program (CMP). The client Director of Security and I waited patiently []

Source:: Cisco Security Notice

Security and the Board

By Stuart Broderick Not long ago I was asked to attend a quarterly Board meeting of one of my healthcare clients and to present the recommendations of a Strategic Security Roadmap (SSR) exercise that my team and I had conducted for the organization. The meeting commenced sharply at 6am one weekday morning and I was allocated the last ten minutes to explain our recommendations and proposed structure for a revised Cybersecurity Management Program (CMP). The client Director of Security and I waited patiently []

Source:: Cisco Security Notice

Creating an Intelligence-Led Security Organization

By Joe Malenfant I recently had the opportunity to sit down with Roland Cloutier, Global Chief Security Officer at ADP and former CISO at EMC, to discuss how they integrate and leverage threat intelligence into their security operations centers as well as their greater security technology infrastructure. It’s pretty rare for the CISO of a F500 company to discuss what technologies they use in such an open way, but it was really a testament to the trust they have for the solutions they []

Source:: Cisco Security Notice