Quantcast
Channel: Cisco Blogs
Browsing all 143 articles
Browse latest View live

POODLE and The Curse of Backwards Compatibility

This post was written by Martin Lee Old protocol versions are a fact of life. When a new improved protocol is released, products still need to support the old version for backwards compatibility. If...

View Article



Understanding Logjam and Future-Proofing Your Infrastructure

On May 19th, 2015 a team of researchers (Henninger et. al) published a paper with the title “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice”. The paper can be divided in two sections:...

View Article

Hiding in Plain Sight: Malware’s Use of TLS and Encryption

Introduction TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or...

View Article

Where is my (intermediate) TLS certificate?

When dealing with TLS connections, it is important to understand how a client (in most cases this is a web browser) will be acting. Let’s quickly check some of the steps that are happening when a TLS...

View Article

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have...

View Article


The impact on network security through encrypted protocols – HTTP/2

This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet,...

View Article

The impact on network security through encrypted protocols – TLS 1.3

This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here:...

View Article

The Impact on Network Security Through Encrypted Protocols – QUIC

QUIC stands for Quick UDP Internet Connections, an experimental protocol designed and deployed by Google.

View Article


TLS 1.3 and Forward Secrecy: Count Us In, and Here’s Why

The damage a hacker can do after discovering a server’s private encryption key is about to shrink considerably. That’s thanks to important improvements in the coming Internet Engineering Task Force...

View Article


To the Depth of TLS Invisibility and Beyond

Encrypted traffic is changing the threat landscape. Today’s digital businesses rely on encryption of application traffic for information sharing. The fact that the Internet is becoming increasingly...

View Article

Network Security Efficacy in the Age of Pervasive TLS Encryption

A Reality Check on Firewall Visibility One question which I love to ask next-generation firewall (NGFW) and intrusion prevention system (IPS) administrators is whether they have seen a gradual decline...

View Article

Image may be NSFW.
Clik here to view.

Seamless shopping with Room & Board

In the bustling world of retail, the customer experience reigns supreme. Retailers are continuously seeking innovative ways to enhance customer engagement and satisfaction. One pioneer in this… Read...

View Article

Image may be NSFW.
Clik here to view.

You’re automated for success with Cisco’s Continuing Education program

The tedious task of logging Continuing Education (CE) credits can be a frustrating speed bump in the certification journey. The Learning and Certifications team gets that and has added automation to…...

View Article


Image may be NSFW.
Clik here to view.

Cisco Live Melbourne SOC Report

Executive Summary. 1 The Team… 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC… Read...

View Article

Image may be NSFW.
Clik here to view.

Improved Area Monitoring with New Meraki Smart Cameras

Meraki’s smart cameras offer businesses an easy-to-deploy way to monitor their physical security, with the added benefit of being managed entirely on the cloud. Various Meraki cameras are deployed in…...

View Article


Image may be NSFW.
Clik here to view.

Simplifying Firewall Management: Cisco Defense Orchestrator Nears FedRAMP®...

Cisco continues its focus on FedRAMP® Authorization for our government customers with yet another solution, Cisco Defense Orchestrator (CDO), which has now achieved FedRAMP In-Process status. With …...

View Article

Image may be NSFW.
Clik here to view.

Celebrating women’s inclusion in the climate innovation space

International Women’s Day (IWD) gives us time to reflect on the achievements women have made before us, the unique challenges women may face today as they continue to break barriers, and what the f…...

View Article


Image may be NSFW.
Clik here to view.

Mitigating Lateral Movement with Zero Trust Access

Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their…...

View Article

Image may be NSFW.
Clik here to view.

Cloud Security API Updates Improve User’s Experience

Welcome “Investigate API” into the Cisco Cloud Security API experience Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to… Read...

View Article

Image may be NSFW.
Clik here to view.

HIMSS 2024 Know Before You Go

The future of healthcare is coming into focus! Now more than ever, we believe that technology is a critical enabler to reinventing our care delivery model.  We have an opportunity to bring accessible …...

View Article
Browsing all 143 articles
Browse latest View live




Latest Images