Articles
Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud
Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad activity. This approach requir…
Five Network Security Horror Stories
Network visibility is crucial to running a strong network security practice. Oftentimes when organizations first deploy Cisco Stealthwatch, it uncovers previously unknown risky or suspicious activity on the network. In some cases, it detects an outright breach. With Halloween right around the corner…
Encrypted Botnets and cryptomining spotted at Cisco Live
More than 25,000 attendees visited Cisco Live in Orlando this year. While this large concentration of network and security professionals was learning about our latest innovations, Cisco Security was busy catching bad guys! Of course we protect our own show, but this year was special… More than 170 c…
Protecting your Public Cloud after Meltdown and Spectre
In early January, researchers unveiled several major security vulnerabilities. Dubbed Meltdown and Spectre, these two vulnerabilities pertained to a hardware flaw in CPUs, including Intel, Qualcomm, and ARM processors. Through a complicated series of exploits targeting “speculative execution,” an op…
Network Visibility for Mergers and Acquisitions
Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials an organization can undergo. Every organization has their own security policies, and applying…
No One Can Detect Threats in Your Public Cloud Like Cisco
Whether it is misconfigured cloud assets, phishing, or malware, protecting your public cloud workloads from threats is a challenge with expensive consequences. If you have tried to extend your on-premises threat detection solutions in the public cloud, you probably know that they can be hard to mana…
Fireproofing your network with software-defined segmentation
We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great’ helps…