The Impacts of Government Regulations on PQC Product Availability

The Impacts of Government Regulations on PQC Product Availability

In our recent blog, The Countdown Has Begun: Getting Started on your PQC Journey, we discussed both Q-Day, the moment when quantum computers will be able break all decryption, and the risk of Harvest Now, Decrypt Later (HNDL) cyberattacks. We focused on addressing top priority post-quantum cryptography (PQC) capabilities, namely, how to begin the migration to quantum-safe hardware. This blog, the third in a series on post-quantum computing, takes on the important issue of U.S….

Read More

Be one of those people that gives back to the community

Be one of those people that gives back to the community

I first met Nicole Hoffman, who is a Security Investigator for Cisco Talos and part of our Strategic Analysis, Threat Intelligence and Interdiction team, during the recording of the Talos IR On Air Q1 2023 episode. This was a live broadcast in which we discussed the trends observed by the Talos IR team in the past quarter. Nicole’s team, among many other things, put together these quarterly threats overview. During the On Air recording, I…

Read More

The Challenges of Building Generative AI Applications in Cybersecurity

The Challenges of Building Generative AI Applications in Cybersecurity

In July, I started an exciting journey with Cisco via the acquisition of Armorblox. Armorblox was acquired by Cisco to further their  AI-first Security Cloud by bringing generative AI experiences to Cisco’s security solutions. The transition was filled with excitement and a touch of nostalgia, as building Armorblox had been my focus for the past three years. Quickly, however, a new mission came my way: Build generative AI Assistants that will allow cybersecurity administrators to…

Read More

Intuition and Curiosity Mix Well with Technology

Intuition and Curiosity Mix Well with Technology

An interview with Valeria Scribanti, a Technical Solutions Specialist with focus on cybersecurity. Welcome to the Cisco Women in Cybersecurity’s blog series, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks to show the importance of allyship, connection, and how different the journeys can be into a career in cybersecurity. Interviewer Intro: Valeria and I met soon after I joined…

Read More

Explorations in the spam folder: A sum greater than the parts

Explorations in the spam folder: A sum greater than the parts

Phishing is a problem that affects everyone, from the untrained to the highly skilled. It’s a problem that happens everywhere, from the office to the home. It comes through email, text, phone calls, etc. The location or means of delivery doesn’t matter—these criminals are going to target you where you are. If the location is one that you’re less likely to suspect, that’s all the better for them. The longer they can mask the scam—revealing…

Read More