About webmaster

This author has not yet filled in any details.
So far webmaster has created 798 blog entries.

The multiplier effect: solving the wireless AI paradox in 2026 on April 2, 2026 at 12:00 pm

In 2026, the AI era demands advanced wireless infrastructure to [...]

Cisco Report: Strategic Wireless Investments are Driving Higher ROI for Enterprises in the AI Era on April 2, 2026 at 3:00 pm

Cisco released its inaugural State of Wireless Report, revealing that [...]

Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders Hazel Burton on April 2, 2026 at 12:00 pm

A conversation between Cisco Talos and Cisco Security leaders on identity, vulnerabilities, and what defenders should focus on in 2025.

​[#item_full_content]  A conversation between Cisco Talos and Cisco Security leaders on identity, vulnerabilities, and what defenders should focus on in 2025.  Read More Cisco Blogs 

By |2026-04-02T12:49:21+00:00April 2, 2026|Cisco: Learning|0 Comments

Building Trust in Generative AI Together: Cisco’s Role in the NIST GenAI Program Krysten Jenci on April 1, 2026 at 8:54 pm

Cisco is supporting NIST’s Generative AI Program, where trust in AI is tested through measurable standards, real-world evaluation, and open benchmarking.

​[#item_full_content]  Cisco is supporting NIST’s Generative AI Program, where trust in AI is tested through measurable standards, real-world evaluation, and open benchmarking.  Read More Cisco Blogs 

By |2026-04-01T21:49:26+00:00April 1, 2026|Cisco: Learning|0 Comments

Identifying and remediating a persistent memory compromise in Claude Code Idan Habler on April 1, 2026 at 5:00 pm

We recently discovered a method to compromise Claude Code’s memory and maintain persistence beyond our immediate session into every project, every session, and even after reboots. In this post, we’ll break down how we were able to poison an AI.....

​[#item_full_content]  We recently discovered a method to compromise Claude Code’s memory and maintain persistence beyond our immediate session into every project, every session, and even after reboots. In this post, we’ll break down how we were able to poison an AI.....  Read More Cisco Blogs 

By |2026-04-01T18:49:21+00:00April 1, 2026|Cisco: Learning|0 Comments

How Visibility-Driven Segmentation is Redefining the OT Security Starting Line John Filitz on April 1, 2026 at 2:51 pm

Cisco at S4x26 showcased how Cyber Vision enables OT asset discovery and segmentation without extra hardware, while also demonstrating the power of Splunk — driving visibility, control, and streamlined SecOps workflows to cut OT cyber risk.

​[#item_full_content]  Cisco at S4x26 showcased how Cyber Vision enables OT asset discovery and segmentation without extra hardware, while also demonstrating the power of Splunk — driving visibility, control, and streamlined SecOps workflows to cut OT cyber risk.  Read More Cisco Blogs 

By |2026-04-01T16:49:31+00:00April 1, 2026|Cisco: Learning|0 Comments

Why full-stack post-quantum cryptography cannot wait Han Lee on April 1, 2026 at 3:00 pm

Full-stack post-quantum cryptography (PQC) is the architectural framework introduced with Cisco IOS XE 26. It is designed to safeguard devices at every layer—securing boot processes, image integrity, network traffic, and management sessions.

​[#item_full_content]  Full-stack post-quantum cryptography (PQC) is the architectural framework introduced with Cisco IOS XE 26. It is designed to safeguard devices at every layer—securing boot processes, image integrity, network traffic, and management sessions.  Read More Cisco Blogs 

By |2026-04-01T16:49:30+00:00April 1, 2026|Cisco: Learning|0 Comments
Go to Top