threat detection
Are You Going About the Talent Shortage Wrong? It’s Time to Stop MacGyvering
We all know the stats. The security workforce shortage is impacting two-thirds of organizations, while the gap — currently at 4 million — continues to grow. Security teams are short-staffed, to the point where a 25% say the inability to keep up with the workload is a root cause of security incidents…
A Platform Approach + Precise Analytics = Better Equation
There are so many companies each year at the RSA Conference, it would be useful to have some analytics to help guide your time there; which of the 700 plus vendors should you try and spend time with to solve your current problems? Similarly, customers are trying to keep up with the growing list of t…
Time for Some Straight Talk Around Network Traffic Analysis
According to research from the Enterprise Strategy Group, 87% of organizations use Network Traffic Analysis (NTA) tools for threat detection and response today, and 43% say that NTA is a “first line of defense” in case of an attack. The increasing IT complexity is one of the main factors in the adop…
Cloudy with a Chance of Extremely High Alert Accuracy
You can tell it’s raining by sticking your head out the door; but what’s the likelihood of it stopping in the next hour? What’s the temperature and relative humidity? Suddenly the need for analytics is apparent. Without it, the chance of getting soaked on any given day would dramatically increase. A…
Learn About Using APIs to Automate Threat Defense and Response
We live in a world with a rapidly evolving threat landscape, where adversaries are employing sophisticated techniques, exploiting the dynamic nature of IT infrastructure and launching asymmetrical attacks. Next week at Cisco Live there is a session in which you can learn how to leverage Cisco’s inte…
Security Vigilance Never Rests: Moving to Active Threat Detection
Few things are as dynamic as cybersecurity. Modern networks have become increasingly sophisticated and complex. Today’s network extends to myriad devices fueled by a mobile workforce and more organizations are shifting workloads to the cloud as they move towards a more digitized future. A diversifyi…
Encrypted Botnets and cryptomining spotted at Cisco Live
More than 25,000 attendees visited Cisco Live in Orlando this year. While this large concentration of network and security professionals was learning about our latest innovations, Cisco Security was busy catching bad guys! Of course we protect our own show, but this year was special… More than 170 c…
Better Services and a Safer Data Center: Tetration in Action at UNC – Charlotte
At the end of the day, technology is at its best when it’s helping people – empowering them to accomplish their goals. Whether that’s members of my team envisioning new products or supporting our current ones – or customers doing more with less and being smarter in their business – that’s when…
Workload protection is a full cycle. Tetration uniquely delivers on it all.
There’s always an inherent challenge between providing a secure infrastructure for your applications and delivering agility. How do you manage a complex web – where apps are dynamic and distributed across your own data center and the cloud – and keep security at the front of your priorities? I…
1