Articles
The State of Machine Learning in 2019
Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression I had. Our 2019 CISO Benchmark Report however, found that between 2018 and 2019, CISO interest in machine learning dropped…
The New Network as a Sensor
Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of sensors to generate telemetry, the network itself (routers, switches, wireless devices, etc.) would deliver the necessary and sufficient telemetry…
Cryptographic Visibility: Quality Encryption at Your Fingertips
There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of the useful analytics I have ever delivered to the market have been grounded in asking the right questions. With that in mind, I’d lik…
Security Vigilance Never Rests: Moving to Active Threat Detection
Few things are as dynamic as cybersecurity. Modern networks have become increasingly sophisticated and complex. Today’s network extends to myriad devices fueled by a mobile workforce and more organizations are shifting workloads to the cloud as they move towards a more digitized future. A diversifyi…
Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products
Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been a process like a melody that ties in all other parts of the song. Staying on this musical analogy, if process is the melody, and you conside…
Gartner ITxpo Session Preview: Best Practices with Machine Learning
Will you be going to the upcoming Gartner Symposium/ITxpo conference in Orlando, Florida in October? If you are, please stop by, attend my session, and say hello as I will be presenting on “Best Practices with Machine Learning in Security Analytics”. For those not attending, here is a brief overvie…
Using machine learning to target threats
This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during their walk in the forest. Surprised, they both start running for their lives, but then one of them stops to put on his running shoes. His buddy says, “Wh…
Cisco catches thousands of hidden threats on a massive public network
The GSMA Mobile World Congress in Barcelona, Spain, is the largest exhibition for a mobile industry. This year, Mobile World Congress attracted more than 107,000 attendees. But high profile, public networks also attract a lot of cyber threats. Providing Internet connectivity to each of these attend…
TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back
Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero trust. The bad news is that threat actors are also benefiting from pervasive encr…
3