Cognitive Research: Learning Detectors of Malicious Network Traffic
This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the…
This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the…
As part of our investment to strengthen the network with more analytics and intelligence to target today’s complex and disruptive threats, Cisco has announced the intent to acquire Cognitive Security, a privately held company headquartered in Prague, Czech Republic. Cognitive provides security software that is focused on applying artificial intelligence techniques to detect advanced cyber threats.
Today, I am pleased to announce Cisco’s intent to acquire Cognitive Security, a privately-held company headquartered in Prague, Czech Republic. Cognitive Security is focused on taking cutting edge research in the field of network security and applying artificial intelligence techniques to detect advanced cyber threats. Cognitive Security’s solution integrates a range of sophisticated software technologies […]
In our last blog, we discussed how Cisco delivers consistency and simplicity, with integrated security, across Enterprise domains. Now, get ready to discuss in more detail how this is done.
2005 has long come and gone, and in this day and age, segmenting traffic on your network should mean more than a separate voice and data VLAN.
For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS).
According to the 2018 Security Capabilities Benchmark Study, 72% of European organisations rely on machine learning to reduce the effort needed to secure their environments.
The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Let’s demystify the term and its value for endpoint security.
Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation…
CONNECT WITH US