Cognitive Research: Learning Detectors of Malicious Network Traffic
This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the…
This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the…
As part of our investment to strengthen the network with more analytics and intelligence to target today’s complex and disruptive threats, Cisco has announced the intent to acquire Cognitive Security, a privately held company headquartered in Prague, Czech Republic. Cognitive provides security software that is focused on applying artificial intelligence techniques to detect advanced cyber threats.
Today, I am pleased to announce Cisco’s intent to acquire Cognitive Security, a privately-held company headquartered in Prague, Czech Republic. Cognitive Security is focused on taking cutting edge research in the field of network security and applying artificial intelligence techniques to detect advanced cyber threats. Cognitive Security’s solution integrates a range of sophisticated software technologies […]
We summarise in this blog Emotet threat, it’s lifecycle and typical detectable patterns. In the second part of the blog we show how to use GTA.
Stealthwatch Release 7.3.0. offers new methods to automate threat response, SecureX and Threat Response integration enhancements, the introduction of the Stealthwatch Data Store, web UI improvements, and security analytics updates.
Cisco Security Technical Alliance (CSTA) facilitates open multivendor product integrations across our Security products. Our largest launch to-date; today we announce new technology partners joining CSTA and over 50 new integrations. We now have grown to over 200 partners representing over 350 product-to-product integrations.
Learn about interesting development challenges for wireless networking, including how machine learning and machine reasoning can lead to “self-healing” wireless networks.
Learn how to use Stealthwatch Enterprise REST APIs to simplify your host group classification workflow, run rich reports and analytics.
Cisco’s cloud-scale architecture combines big data, compute farm, and storage tiers. They work together as a single entity, yet scale independently to address IT and operational needs.
CONNECT WITH US