Stories by John Stewart, senior vice president and chief security officer, Cisco

Trustworthy systems, trustworthy vendors, and how to identify them

It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.