Articles
Seeing Inside the Vortex: Detecting Living off the Land Techniques
3 min read
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections
5 min read
Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.
Relevant and Extended Detection with SecureX, Part Three: Behaviour-Based Detections with Secure Network Analytics
5 min read
Discover how to leverage Secure Network Analytics to deploy Behaviour-Based Detections, making them more relevant and actionable with Cisco SecureX.
Relevant and Extended Detection with SecureX, Part Two: Endpoint Detections
6 min read
Discover how to automatically extend Cisco Secure Endpoint detections, making them more relevant and actionable with Cisco SecureX.
Relevant and Extended Detection with SecureX
5 min read
Extend your detections: incident prioritization with Cisco SecureX.
TrustSec Policy Analytics – Part Three: Policy Validation
5 min read
TrustSec Policy Analytics – Part Three delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
TrustSec Policy Analytics – Part Two: Policy Visualization
5 min read
TrustSec Policy Analytics – Part Two delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
Cisco Security at Work: Threatwall at Mobile World Congress 2019
3 min read
The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.
Three ways to detect cryptomining activities using network security analytics
4 min read
Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process...
- 1
- 2