How We Apply Machine Learning in Cisco Advanced Threat Solutions
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other….
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other….
This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during…
If someone were to ask you if your network is secure, can you confidently say ‘yes’? Because that would mean you have a way to know if there’s been an…
Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With…
Cisco products and services offers the strong foundation for your enterprise infrastructure and makes your organization ready to fight today’s hidden threats, ultimately saving lots of money in security damages.
Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.
Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of cancer […]
This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid…
This is Part 3 of our blog series about NG-Firewalls. See Part 1 here.
What good is a malicious verdict on something…