Avatar

TK Keanini

CTO

Security Business Group

TK brings over 25 years of network and security experience to Cisco. With a penchant for driving technical innovation, he is responsible for integrating security solutions with private and public cloud-based computing platforms.

Articles

November 13, 2020

SECURITY

Under Analytics

As more organizations turn to SaaS options for monitoring and managing their network security, it’s time to revise how we look at the network being “under management.”

November 6, 2020

SECURITY

Secure Network Analytics (Stealthwatch): Then, Now, and Beyond

A look back at the history and origins of Secure Network Analytics as a we explore the beginnings of the recognized industry leader in Network Detection and Response (NDR).

October 23, 2020

SECURITY

Defense in Diversity

Security has favored “Defense in Depth” as the dominant strategy. As we enter the world of automated workloads at internet-scale, it is clear that “Defense in Diversity” wins over depth.

July 16, 2020

SECURITY

The Tactical Chameleon: Security Through Diverse Strategy

In order to effectively combat an increasingly strategic and varied set of threats, security professionals need to take a page from Musashi Miyamoto and fighting game players.

May 2, 2019

SECURITY

The State of Machine Learning in 2019

Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression...

April 25, 2019

SECURITY

The New Network as a Sensor

Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of...

April 16, 2019

SECURITY

Cryptographic Visibility: Quality Encryption at Your Fingertips

There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of...

January 9, 2019

SECURITY

Security Vigilance Never Rests: Moving to Active Threat Detection

Not all security analytics tools are created equal. Cisco Stealthwatch collects and analyzes massive volumes of data, providing comprehensive internal visibility and protection to even the largest, most complex networks.

December 3, 2018

SECURITY

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been...

October 4, 2018

SECURITY

Gartner ITxpo Session Preview: Best Practices with Machine Learning

Will you be going to the upcoming Gartner Symposium/ITxpo conference in Orlando, Florida in October?

July 26, 2018

SECURITY

Using machine learning to target threats

This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during...

May 3, 2018

SECURITY

Cisco catches thousands of hidden threats on a massive public network

The GSMA Mobile World Congress in Barcelona, Spain, is the largest exhibition for a mobile industry.  This year, Mobile World Congress attracted more than 107,000 attendees. But high profile, public...

April 11, 2018

SECURITY

TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back

Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero...

April 2, 2018

SECURITY

Encrypted Traffic Analytics Receives “Miercom Performance Verified” Certification

Encryption is becoming an increasingly prevalent aspect of digital communications – even when it comes to malware. A Cisco analysis of more than 400,000 malicious binaries found that about

March 22, 2018

SECURITY

Serverless Security for Public Cloud Workloads with Stealthwatch Cloud

Businesses absolutely love serverless computing because of the reduced IT administrative burden, but delegation of control to the service provider also delegates the detection, mitigation, and remediation of threats.

October 17, 2017

SECURITY

Three Ways in which Stealthwatch Helps You Get More from Your Network Data

Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he had to […]

June 22, 2017

SECURITY

What is the Body Language of Your Encrypted Network Traffic Really Saying?

The rise of encrypted traffic is changing the threat landscape; the increase in digital business has increased the number of services using encrypted traffic to secure information.

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibility for network security monitoring. Some of the key findings include: Many organizations now […]