Mapping Secure Network Analytics (and Cognitive) to NIST CSF Categories and Sub-Categories
This blog articulates how Cisco Secure Network Analytics with Cognitive is aligned to NIST Cybersecurity Framework Categories
This blog articulates how Cisco Secure Network Analytics with Cognitive is aligned to NIST Cybersecurity Framework Categories
Network telemetry can identify user behaviors, malicious tools installed in enterprise environments, and malware itself. Are you applying a global view to your network? If not, read on to learn more.
With encryption becoming the new norm, it’s increasingly important for organizations to gain visibility into all traffic across the enterprise. Cisco’s intuitive network can help detect hidden security threats, even in encrypted traffic.
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was…
The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.
Cisco Stealthwatch release 7.0 introduces significant enhancements for the Stealthwatch administrator and the security analyst to detect and respond to threats faster, and manage the tool more efficiently.
Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process…
Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with…
Command Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments.