network security
7 Questions about the Firewall: A Chat with Cisco featuring Gartner
The firewall remains the front line of cyber-defense for most organizations. The firewall protects an organization’s network, and that function isn’t going away anytime soon. Remember when people used to say, “the firewall is dead”? The numbers tell a different story. Gartner forecasts that this mar…
Attivo Networks ThreatDirect™ Deception in a Docker Container
Scaling with the Cisco Catalyst 9000 Family of Switches This blog is authored by Joseph Salazar, Technical Marketing Engineer at Attivo Networks Networks are constantly evolving to meet the demands of ever-expanding digital business infrastructure. Organizational networks can now include remote offi…
Can your firewall do that?
Part 3: Save time and reduce complexity with better management, automated operations, and product integration Networking and security teams are up against a lot. Hunting for cyberthreats is difficult. Policy management and enforcement across multiple devices is time-consuming and error-prone. Most t…
Can your firewall do that?
Part 2: Visibility to detect and stop threats fast In my last post, we explored how a firewall should be using top-notch threat intelligence, sound security policy, and features like intrusion prevention to pre-emptively stop threats before they can embed themselves in your network. These preventive…
Can your firewall do that?
Part 1: Prevent breaches automatically to keep your business moving At Cisco, we’re constantly talking with executives and IT leaders about cybersecurity. They’re concerned – they want to know how to protect their company, their employees, and their customers. But three primary concerns always seem…
Five Network Security Horror Stories
Network visibility is crucial to running a strong network security practice. Oftentimes when organizations first deploy Cisco Stealthwatch, it uncovers previously unknown risky or suspicious activity on the network. In some cases, it detects an outright breach. With Halloween right around the corner…
Scaling Visibility and Security within the Operational Technology (OT) Environment
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS, and malware detection (if you are lucky), but a soft interior leaving critical operational assets…
The big myth about security patch management
“If we had just kept our systems patched, the malware wouldn’t have been a problem.” After every major breach you usually hear those words echoed across news media. You might even pause for a moment and tell yourself that if the victims had just patched their systems, they would have bee…
Cloud Unfiltered, Episode 49: Sustainable Security Technology, with Patrick Crowley
I am not typically nervous when I go into podcast interviews, but I have to admit that I was more than a little intimidated by the time I’d finished my research on Patrick Crowley. It wasn’t just that he is the Stealthwatch Cloud CTO. I mean, I suppose that alone is intimidating on its face, but we…