Avatar

Matthew Robertson

Principal Engineer

Security Business Group

Matthew Robertson is a Principal Engineer in the Security Business Group at Cisco focused on security analytics as well as extended detection and response. An experienced network security practitioner Matt often takes a practical view towards how to best operationalize security intelligence and detections against security policy. Matt regularly advises Cisco customers on their use of security technologies and is a frequent speaker at Cisco Live events as well as other industry events worldwide.

Articles

February 17, 2022

SECURITY

Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections

5 min read

Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.

June 21, 2021

SECURITY

TrustSec Policy Analytics – Part Three: Policy Validation

5 min read

TrustSec Policy Analytics – Part Three delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.

June 8, 2021

SECURITY

TrustSec Policy Analytics – Part Two: Policy Visualization

5 min read

TrustSec Policy Analytics – Part Two delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.

February 27, 2019

SECURITY

Cisco Security at Work: Threatwall at Mobile World Congress 2019

3 min read

The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.

December 20, 2018

SECURITY

Three ways to detect cryptomining activities using network security analytics

4 min read

Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process...

August 4, 2016

SECURITY

Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1

2 min read

Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through...