Cisco Cloud Security
Using Amazon Web Services? Cisco Stealthwatch Cloud has all your security needs covered
Like many consumers of public cloud infrastructure services, organizations that run workloads in Amazon Web Services (AWS) face an array of security challenges that span from traditional threat vectors to the exploitation of more abstract workloads and entry points into the infrastructure. This week…
The New Network as a Sensor
Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of sensors to generate telemetry, the network itself (routers, switches, wireless devices, etc.) would deliver the necessary and sufficient telemetry…
Cisco is Looking Forward to Seeing You at the Big 5G Event
Building on the tremendous momentum generated at MWC-Barcelona a few months ago, Cisco is the Diamond sponsor for the Big 5G Event May 6-8 in Denver, CO. This is a great opportunity to learn about the Cisco 5G architecture, how it is being implemented today, and to learn about some new cloud-native…
Cisco Stealthwatch becomes the only security analytics product to detect threats across private networks, public clouds, …
You have a bigger, more open, and diverse network than ever before. Whether you want to go all-in on cloud, spread your infrastructure across multiple public clouds, embrace containers and Kubernetes, leverage serverless architectures, or double down on on-premise, Cisco Stealthwatch has you covered…
Cisco Stealthwatch Cloud and Microsoft Azure: reliable cloud infrastructure meets comprehensive cloud security
Isn’t it great when the enterprise technology solutions you use to achieve various business outcomes partner and work seamlessly with each other? Cisco and Microsoft have done just that to provide you with a scalable and high-performance cloud infrastructure along with easy and effective cloud secur…
How Stealthwatch Cloud protects against the most critical Kubernetes vulnerability to-date, CVE-2018-1002105
The increasing popularity of traditional cloud computing technologies such as server-less, on-demand compute and containerized environments has made technologies like Kubernetes part of our daily vernacular as it relates to running our applications and workloads. Kubernetes solves many of the proble…
A new way to think about security in AWS
Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and access management, granular activity logs, and strong policy enforcement. Howe…
How Alliances Strengthen Your Cybersecurity Defenses
When we started the Cisco Security Technology Alliance (CSTA) a few years ago, we didn’t envisage it growing into such a large ecosystem of technology spanning the breadth of our Cisco Security portfolio in such a short span of time. But security is most effective when it works as an integrated syst…
Send Cryptojacking Packing
Although the cryptocurrency market may have lost ~70% of market cap from a high of $835B, it hasn’t stopped malicious actors, ravenous for the next bull run, from mining cryptocurrency. The birth of cryptocurrency has altered the threat landscape making it easier for malicious actors to get paid and…