Skip to content
Cisco Logo
Cisco Blogs
Executive Platform
AI
Networking
Data Center
Security
More
  • All Industries
  • All Countries + Regions
  • Cisco Insider
  • Cisco on Cisco
  • CX
  • Developer
  • High Tech Policy
  • Industrial IoT
  • Innovation
  • Learn with Cisco
  • Our Corporate Purpose
  • Partner
  • SP360: Service Provider
  • SMB: Small and Medium Business
  • We Are Cisco
  • Subscribe to Cisco Blogs
Menu
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select
  • Downloads
  • Certifications
  • Design Guides
  • Training
  • Community
  • Careers

Cisco Blogs

Search Results for: cognitive, threat, analytics

How We Apply Machine Learning in Cisco Advanced Threat Solutions

Posted on August 1, 2018January 3, 2020 by Joe Malenfant
How We Apply Machine Learning in Cisco Advanced Threat Solutions

There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other….

Using machine learning to target threats

Posted on July 26, 2018July 26, 2018 by TK Keanini
Using machine learning to target threats

This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during…

4 Comments on Using machine learning to target threats

See and respond in time to those pesky threats that cross the perimeter

Posted on April 9, 2018April 9, 2018 by Megha Mehta
See and respond in time to those pesky threats that cross the perimeter

If someone were to ask you if your network is secure, can you confidently say ‘yes’? Because that would mean you have a way to know if there’s been an…

CMS Brute Force Attacks Are Still a Threat

Posted on November 30, 2017March 15, 2019 by Anna Shirokova
CMS Brute Force Attacks Are Still a Threat

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With…

Analyzing Network Traffic with Encrypted Traffic Analytics

Posted on October 24, 2017March 15, 2019 by Kshitij Mahant
Analyzing Network Traffic with Encrypted Traffic Analytics

Cisco products and services offers the strong foundation for your enterprise infrastructure and makes your organization ready to fight today’s hidden threats, ultimately saving lots of money in security damages.

1 Comment on Analyzing Network Traffic with Encrypted Traffic Analytics

A Guide for Encrypted Traffic Analytics

Posted on October 4, 2017February 8, 2021 by Jason Liu
A Guide for Encrypted Traffic Analytics

Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.

4 Comments on A Guide for Encrypted Traffic Analytics

Cisco IoT Threat Defense: Securing the IoT at Scale

Posted on May 23, 2017May 22, 2017 by Marc Blackmer
Cisco IoT Threat Defense: Securing the IoT at Scale

Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of cancer […]

1 Comment on Cisco IoT Threat Defense: Securing the IoT at Scale

Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats

Posted on January 19, 2017April 9, 2019 by Veronica Valeros
Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats

This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid…

1 Comment on Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats

Threat-Focused NG-Firewall – Who Cares? Part 3

Posted on December 21, 2015March 12, 2019 by Mike Storm
Threat-Focused NG-Firewall – Who Cares? Part 3

This is Part 3 of our blog series about NG-Firewalls. See Part 1 here.

Part 3: Challenges of the Typical NGFW

What good is a malicious verdict on something…

6 Comments on Threat-Focused NG-Firewall – Who Cares? Part 3

Posts navigation

Older posts
Newer posts
  • About Cisco
  • Contact Us
  • Careers
  • Connect with a partner
  • Feedback
  • Help
  • Terms & Conditions
  • Privacy
  • Cookies / Do not sell or share my personal data
  • Accessibility
  • Trademarks
  • Supply Chain Transparency
  • Newsroom
  • Sitemap
©2026 Cisco Systems, Inc.