stealthwatch

January 31, 2020

SECURITY

Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!

As businesses continue to move towards a more digital future, the threats they face continue to become more complex. As many organizations continue to embrace the benefits of cloud, IoT, and an increasingly mobile workforce, threat actors are taking advantage of these attack vectors to work their wa…

January 29, 2020

SECURITY

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a par…

January 28, 2020

SECURITY

Time for Some Straight Talk Around Network Traffic Analysis

According to research from the Enterprise Strategy Group, 87% of organizations use Network Traffic Analysis (NTA) tools for threat detection and response today, and 43% say that NTA is a “first line of defense” in case of an attack. The increasing IT complexity is one of the main factors in the adop…

January 27, 2020

SECURITY

Cloudy with a Chance of Extremely High Alert Accuracy

You can tell it’s raining by sticking your head out the door; but what’s the likelihood of it stopping in the next hour? What’s the temperature and relative humidity? Suddenly the need for analytics is apparent. Without it, the chance of getting soaked on any given day would dramatically increase. A…

December 17, 2019

SECURITY

Cisco and IBM: Solving Customer Challenges through the Power of Partnerships

Complexity is one of the top challenges our customers face today. CISOs not only want to enable their teams to detect and respond to threats faster, they want to simplify workflows and streamline operations at the same time. In our annual CISO surveys, we’ve been seeing a trend toward vendor consoli…

November 18, 2019

SECURITY

The Importance of the Network in Detecting Incidents in Critical Infrastructure

As we saw in my last blog, the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure those connected devices are acting…

November 5, 2019

SECURITY

Securing Your Future by Innovating Today

At a time when cybercrime costs three times more than natural disasters globally1, the demands on security are constantly growing. Whether you’re asked to protect a workforce that roams anywhere, a workplace that is digitized, or workloads that run wherever, your disparate security solutions are cre…

September 30, 2019

SECURITY

Threats in encrypted traffic

There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troub…

August 13, 2019

GOVERNMENT

Cybersecurity for Federal Networks: It All Starts with Visibility

Guest Author: Neil Lovering  |  CCIE #1772  |  Sr. Solutions Architect, Security @Cisco   True story: A security director walks into a Security Operations Center (SOC) where a demonstration of a network visibility tool is occurring, in real-time, on his network. He immediately points out what h…