Securing Encrypted Traffic on a Global Scale
written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...
How (not) to Sample Network Traffic
This post has been authored by Karel Bartos and Martin Rehak The volume of the network traffic has been steadily increasing in the last years. In the same time, the delivery of critical services from cloud data centers has increased not only the volume of traffic, but also the complexity of transactions. High volumes of […]
Angler for Beginners in 34 Seconds
Post authored by Martin Rehak, Veronica Valeros, Martin Grill and Ivan Nikolaev. In order to complement the comprehensive information about the Angler exploit kit from our Talos colleagues [
Cognitive Threat Analytics – Transparency in Advanced Threat Research
Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer's networks by means of advanced statistical analysis, machine learning and global correlation...