Cisco Stealthwatch

January 26, 2018

SECURITY

Securing Encrypted Traffic on a Global Scale

7 min read

written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...

January 23, 2018

CLOUD

Encrypted On-Prem Connections to Public Clouds

2 min read

Cisco Validated Designs (CVDs) help you select a configuration for redundant encrypted tunnels between Google Cloud Platform (GCP) and the traditional private data center.

January 3, 2018

SECURITY

Harnessing the Power of Network Meta Data: Finding Malware

2 min read

Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data.  These threats are seemingly everywhere.  In order to protect against these threats, we use strong passwords and encryption.  Unfortunately, our adversaries are getting the same messages as they continue to scoop up our […]

December 18, 2017

DEVELOPER

Cyber Security is As Much about People as Technology

3 min read

Cisco hosted the Southern California Cybercup Challenge in December in Cisco’s Customer Experience Center, and I was lucky to welcome a group of college and high school kids from across...

November 29, 2017

SECURITY

Improving Cybersecurity in Healthcare Part II: Control

4 min read

The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]

October 25, 2017

SECURITY

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

3 min read

With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations.  Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]

October 25, 2017

SECURITY

Fireproofing your network with software-defined segmentation

5 min read

We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great’ helps prove this point: The 1835 […]

October 17, 2017

SECURITY

Three Ways in which Stealthwatch Helps You Get More from Your Network Data

2 min read

Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he had to […]