Avatar

TK Keanini

Principal Engineer

Lancope Engineering

TK brings nearly 25 years of network and security experience to Cisco. With a penchant for driving technical innovation, he is responsible for integrating security solutions with private and public cloud-based computing platforms.

Articles

May 2, 2019

SECURITY

The State of Machine Learning in 2019

Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression I had. Our 2019 CISO Benchmark Report however, found that between 2018 and 2019, CISO interest in machine learning dropped…

April 25, 2019

SECURITY

The New Network as a Sensor

Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of sensors to generate telemetry, the network itself (routers, switches, wireless devices, etc.) would deliver the necessary and sufficient telemetry…

April 16, 2019

SECURITY

Cryptographic Visibility: Quality Encryption at Your Fingertips

There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of the useful analytics I have ever delivered to the market have been grounded in asking the right questions. With that in mind, I’d lik…

January 9, 2019

SECURITY

Security Vigilance Never Rests: Moving to Active Threat Detection

Few things are as dynamic as cybersecurity. Modern networks have become increasingly sophisticated and complex. Today’s network extends to myriad devices fueled by a mobile workforce and more organizations are shifting workloads to the cloud as they move towards a more digitized future. A diversifyi…

December 3, 2018

SECURITY

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been a process like a melody that ties in all other parts of the song.  Staying on this musical analogy, if process is the melody, and you conside…

October 4, 2018

SECURITY

Gartner ITxpo Session Preview: Best Practices with Machine Learning

Will you be going to the upcoming Gartner Symposium/ITxpo conference in Orlando, Florida in October? If you are, please stop by, attend my session, and say hello as I will be presenting on “Best Practices with Machine Learning in Security Analytics”.  For those not attending, here is a brief overvie…

July 26, 2018

SECURITY

Using machine learning to target threats

This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during their walk in the forest. Surprised, they both start running for their lives, but then one of them stops to put on his running shoes. His buddy says, “Wh…

May 3, 2018

SECURITY

Cisco catches thousands of hidden threats on a massive public network

The GSMA Mobile World Congress in Barcelona, Spain, is the largest exhibition for a mobile industry.  This year, Mobile World Congress attracted more than 107,000 attendees. But high profile, public networks also attract a lot of cyber threats. Providing Internet connectivity to each of these attend…

April 11, 2018

SECURITY

TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back

Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero trust.  The bad news is that threat actors are also benefiting from pervasive encr…