Cisco Stealthwatch

Blog post

Harnessing the Power of Network Meta Data: Finding Malware

Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data.  These threats are seemingly everywhere.  In order to protect against these threats, we use strong passwords and encryption.  Unfortunately, our adversaries are getting the same messages as they continue to scoop up our […]

January 3, 2018 2 min read
Blog post

Improving Cybersecurity in Healthcare Part II: Control

The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]

November 29, 2017 4 min read
Blog post

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco…

With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations.  Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]

October 25, 2017 3 min read