Trustworthy Systems: A Peek Behind the Curtain
By Graham Holmes In a recent post, “ Evolution of attacks on Cisco IOS devices ”, we discussed how threats against network devices have evolved. There was no evidence that a remote attack vector or vulnerability in Cisco IOS was related to these attacks. This reinforces the value of creating more hardened and resilient systems. The strategy for creating more secure technology has an unending goal, yet it’s a journey worth sharing. Much has been written about and shared on our secure development lifecycle and our efforts to ensure security in the supply chain . […]
Source:: Cisco Security Notice