Skip to content
Cisco Logo
Cisco Blogs
Cisco Thought Leadership
  • Executive Platform
  • High Tech Policy
  • Innovation
  • Our Corporate Purpose
  • We Are Cisco
Products & Services
  • Artificial Intelligence - AI
  • Collaboration
  • Customer Experience (CX)
  • Data Center
  • Industrial IoT
  • Networking
  • Security
  • Small Business
  • SP360: Service Provider
Industries
  • All Industries
  • Education
  • Energy - Oil & Gas, Mining and Utilities
  • Financial Services
  • Government
  • Healthcare
  • Manufacturing
  • Retail & Hospitality
  • Sports, Media & Entertainment
  • Transportation
Partners & Customer Success
  • Cisco Insider Voices
  • Partners
More
  • For the Tech Expert
    • Cisco on Cisco
    • Developer
    • Learn with Cisco
  • Countries & Regions
Menu
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select
  • Downloads
  • Certifications
  • Design Guides
  • Training
  • Community
  • Careers

Cisco Blogs

  • Our Favorite Content:
  • Artificial Intelligence (AI)
  • Sustainability
  • Related Product Blog Sites
    • Cisco AppDynamics Blog
    • Cisco Meraki Blog
    • Cisco Talos – Threat Research
    • Cisco ThousandEyes Blog
    • Cisco Umbrella Blog
    • Splunk – A Cisco Company
    • Webex Blog
  • Subscribe to Cisco Blogs

Search Results for: cognitive, threat, analytics

Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics

Posted on August 23, 2017March 15, 2019 by Evgeny Mirolyubov
Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics

Our data shows that there are 5 to 10 breaches per 1000 seats every week. That number is staggering and exemplifies the limits of traditional prevention. Most of these attacks…

1 Comment on Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

Posted on September 19, 2016April 9, 2019 by Veronica Valeros
Cognitive Threat Analytics: Turn Your Proxy Into Security Device

This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively…

2 Comments on Cognitive Threat Analytics: Turn Your Proxy Into Security Device

AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

Posted on June 8, 2016March 15, 2019 by John Dominguez
AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping…

6 Comments on AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

Find Advanced Threats with Cisco Cognitive Threat Analytics

Posted on February 2, 2016March 15, 2019 by Joe Malenfant
Find Advanced Threats with Cisco Cognitive Threat Analytics

Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of…

1 Comment on Find Advanced Threats with Cisco Cognitive Threat Analytics

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

Posted on December 14, 2015April 9, 2019 by Michal Svoboda
Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

This post is authored by Gayan de Silva and Martin Pospisil.

Overview

Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about…

Cognitive Threat Analytics – Transparency in Advanced Threat Research

Posted on September 11, 2015April 9, 2019 by Martin Rehak
Cognitive Threat Analytics – Transparency in Advanced Threat Research

Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer’s networks by means of advanced statistical analysis, machine learning and global correlation…

3 Comments on Cognitive Threat Analytics – Transparency in Advanced Threat Research

Introducing Cisco Cognitive Threat Analytics

Posted on February 28, 2014March 15, 2019 by Andrew Haire
Introducing Cisco Cognitive Threat Analytics

“There is no silver bullet.”  That’s one of our favorite sayings at Cisco Security. We use it to convey the point that malware prevention is not 100%. As new attack…

Unleash(ed) AI: The Rise of Cognitive Security Operations

Posted on October 21, 2025October 20, 2025 by Jasjeet Singh
Unleash(ed) AI: The Rise of Cognitive Security Operations

Discover how Cognitive Security, powered by agentic AI, transforms cyber defense. Learn how Cisco helps organizations move from reactive to proactive security operations. Explore now →

How to Respond to Apache Log4j using Cisco Secure Analytics

Posted on December 17, 2021December 12, 2022 by Robert Harris
How to Respond to Apache Log4j using Cisco Secure Analytics

Security professionals are working to assess their exposure to Apache Log4j vulnerability (CVE-2021-44228). The following guide on how to respond is here.

Posts navigation

Older posts
  • About Cisco
  • Contact Us
  • Careers
  • Connect with a partner
  • Feedback
  • Help
  • Terms & Conditions
  • Privacy
  • Cookies / Do not sell or share my personal data
  • Accessibility
  • Trademarks
  • Supply Chain Transparency
  • Newsroom
  • Sitemap
©2026 Cisco Systems, Inc.