Gartner ITxpo Session Preview: Best Practices with Machine Learning
Will you be going to the upcoming Gartner Symposium/ITxpo conference in Orlando, Florida in October?
Using machine learning to target threats
This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during...
Cisco catches thousands of hidden threats on a massive public network
The GSMA Mobile World Congress in Barcelona, Spain, is the largest exhibition for a mobile industry. This year, Mobile World Congress attracted more than 107,000 attendees. But high profile, public...
TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back
Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero...
Encrypted Traffic Analytics Receives “Miercom Performance Verified” Certification
Encryption is becoming an increasingly prevalent aspect of digital communications – even when it comes to malware. A Cisco analysis of more than 400,000 malicious binaries found that about
Serverless Security for Public Cloud Workloads with Stealthwatch Cloud
Businesses absolutely love serverless computing because of the reduced IT administrative burden, but delegation of control to the service provider also delegates the detection, mitigation, and remediation of threats.
Three Ways in which Stealthwatch Helps You Get More from Your Network Data
Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he had to […]
What is the Body Language of Your Encrypted Network Traffic Really Saying?
The rise of encrypted traffic is changing the threat landscape; the increase in digital business has increased the number of services using encrypted traffic to secure information.
The True Value of Network Security Monitoring
The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibility for network security monitoring. Some of the key findings include: Many organizations now […]
The Formula One Approach to Security
Many of today’s systems are built on telemetry, the automated gathering of remote data measurements to gain insights and manage performance and operations. One industry that has been quick to embrace telemetry is auto racing. Winning racing teams are outfitting their cars with around 100 sensors that monitor thousands of components. Every race weekend, hundreds […]