Articles
Using Amazon Web Services? Cisco Stealthwatch Cloud has all your security needs covered
Like many consumers of public cloud infrastructure services, organizations that run workloads in Amazon Web Services (AWS) face an array of security challenges that span from traditional threat vectors to the exploitation of more abstract workloads and entry points into the infrastructure. This week…
How Stealthwatch Cloud protects against the most critical Kubernetes vulnerability to-date, CVE-2018-1002105
The increasing popularity of traditional cloud computing technologies such as server-less, on-demand compute and containerized environments has made technologies like Kubernetes part of our daily vernacular as it relates to running our applications and workloads. Kubernetes solves many of the proble…
A new way to think about security in AWS
Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and access management, granular activity logs, and strong policy enforcement. Howe…
A Required Cloud Native Security Mindset Shift
There has been a significant shift in the public cloud infrastructure offerings landscape in the last 3-5 years. With that shift we as Information Security practitioners must also fundamentally shift our tactics and view of how these new services can be leveraged as a whole new landscape of possible…
Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud
Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset provides an incredibly accurate recording for every network conversation that has trans…
Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster
Cisco Stealthwatch Cloud has the unique ability to provide an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. It really doesn’t matter where the cluster resides, whether on-premise or in any public cloud environment. Stealthwatch Cloud deploys as a d…
Protecting Kubernetes environments with Stealthwatch Cloud
Container orchestration and automation is taking the DevOps world by storm. Docker is the de-facto standard in the realm of containers. When a parallel for container orchestration is drawn, Kubernetes is the go-to orchestration solution for automating and scaling a container deployment, be it on-pre…