Cisco Stealthwatch

March 11, 2020

SECURITY

Five ways to detect early signs of a breach using the network

While organizations would ideally like to do everything they can to block a cybersecurity attack, the reality is that internal and external threats targeting your network can find a way to infiltrate and cause a major breach. So how can you answer questions like – Have we been compromised? What did…

February 13, 2020

SECURITY

Cisco and Telenor: Working Together to Protect Infrastructure

For service providers around the world, security is a fundamental and integral part of what they do. With operations across Scandinavia and Asia, Telenor is no exception. The company connects 183 million customers, and each one of them expects secure connections. It’s a given. That’s a key reason Te…

January 31, 2020

SECURITY

Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!

As businesses continue to move towards a more digital future, the threats they face continue to become more complex. As many organizations continue to embrace the benefits of cloud, IoT, and an increasingly mobile workforce, threat actors are taking advantage of these attack vectors to work their wa…

January 16, 2020

DEVELOPER

See Stealthwatch Enterprise in the DevNet Zone at Cisco Live

Stealthwatch Enterprise is returning to the DevNet Zone this month in Barcelona, and we are bringing some new REST API capabilities with us to share! Cisco Stealthwatch Enterprise is the most comprehensive solution for visibility and security analytics on the market today. It is no surprise that Ste…

December 18, 2019

SECURITY

Stealthwatch Enterprise and Cisco Threat Response: Bringing machine-scale analysis to human-scale understanding

From zero-day malware to cryptojacking, from man-in-the-middle attacks to spear phishing, from ransomware to distributed denial of service attacks (DDoS) attempts – businesses of all sizes and industries are the constant target of these attacks. It’s perfectly normal to find this barrage of th…

December 10, 2019

SECURITY

Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers

There’s no doubt that cloud adoption has led to accelerated business outcomes. The flexibility of compute and ease of deployment is empowering for developers. But developing applications in the cloud has challenged security teams who are attempting to ensure the same protections in the cloud as on-p…

November 18, 2019

SECURITY

The Importance of the Network in Detecting Incidents in Critical Infrastructure

As we saw in my last blog, the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure those connected devices are acting…

September 30, 2019

SECURITY

Threats in encrypted traffic

There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troub…

June 10, 2019

NETWORKING

3 Ways Intent-Based Networking Fulfills Business Intent with Multidomain Integration

Thanks to intent-based networking (IBN), your IT team no longer needs to panic when it’s asked to support a new business initiative, acquiring a new team, or onboarding new applications. With IBN, IT teams can quickly set up the appropriate networking policies to support any new need, in any domain:…