Cisco Stealthwatch
Five ways to detect early signs of a breach using the network
While organizations would ideally like to do everything they can to block a cybersecurity attack, the reality is that internal and external threats targeting your network can find a way to infiltrate and cause a major breach. So how can you answer questions like – Have we been compromised? What did…
Cisco and Telenor: Working Together to Protect Infrastructure
For service providers around the world, security is a fundamental and integral part of what they do. With operations across Scandinavia and Asia, Telenor is no exception. The company connects 183 million customers, and each one of them expects secure connections. It’s a given. That’s a key reason Te…
Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!
As businesses continue to move towards a more digital future, the threats they face continue to become more complex. As many organizations continue to embrace the benefits of cloud, IoT, and an increasingly mobile workforce, threat actors are taking advantage of these attack vectors to work their wa…
See Stealthwatch Enterprise in the DevNet Zone at Cisco Live
Stealthwatch Enterprise is returning to the DevNet Zone this month in Barcelona, and we are bringing some new REST API capabilities with us to share! Cisco Stealthwatch Enterprise is the most comprehensive solution for visibility and security analytics on the market today. It is no surprise that Ste…
Stealthwatch Enterprise and Cisco Threat Response: Bringing machine-scale analysis to human-scale understanding
From zero-day malware to cryptojacking, from man-in-the-middle attacks to spear phishing, from ransomware to distributed denial of service attacks (DDoS) attempts – businesses of all sizes and industries are the constant target of these attacks. It’s perfectly normal to find this barrage of th…
Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers
There’s no doubt that cloud adoption has led to accelerated business outcomes. The flexibility of compute and ease of deployment is empowering for developers. But developing applications in the cloud has challenged security teams who are attempting to ensure the same protections in the cloud as on-p…
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog, the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure those connected devices are acting…
Threats in encrypted traffic
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troub…
3 Ways Intent-Based Networking Fulfills Business Intent with Multidomain Integration
Thanks to intent-based networking (IBN), your IT team no longer needs to panic when it’s asked to support a new business initiative, acquiring a new team, or onboarding new applications. With IBN, IT teams can quickly set up the appropriate networking policies to support any new need, in any domain:…