Defense in Diversity
Security has favored “Defense in Depth” as the dominant strategy. As we enter the world of automated workloads at internet-scale, it is clear that “Defense in Diversity” wins over depth.
The Tactical Chameleon: Security Through Diverse Strategy
In order to effectively combat an increasingly strategic and varied set of threats, security professionals need to take a page from Musashi Miyamoto and fighting game players.
The New Network as a Sensor
Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of...
Cryptographic Visibility: Quality Encryption at Your Fingertips
There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of...
Security Vigilance Never Rests: Moving to Active Threat Detection
Not all security analytics tools are created equal. Cisco Stealthwatch collects and analyzes massive volumes of data, providing comprehensive internal visibility and protection to even the largest, most complex networks.
Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products
Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been...
Gartner ITxpo Session Preview: Best Practices with Machine Learning
Will you be going to the upcoming Gartner Symposium/ITxpo conference in Orlando, Florida in October?