Security with Privacy – Solving the encryption problem without decryption
Cisco has also developed several mechanisms in core network infrastructure and services to help organisations detect threats and enforce AUP without breaking applications and user privacy.
Scaling Visibility and Security within the Operational Technology (OT) Environment
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS,...
Cisco Stealthwatch and Cisco DNA Center bridge the SecOps – NetOps divide
Three trends to watch in the increasingly interdependent roles of NetOps and SecOps: complexity of managing more devices, locations and users; automating across different functions; the impact on network assurance.
Industrial Security and the Art of Defense
Sun Tzu's the Art of War is a famous book known for insights from the Chinese philosopher with a guided focus on leadership, strategy and military theories. While the book...
Stealthwatch Cloud on TechWiseTV
Is it possible that security could actually be easier for cloud vs. your on-prem infrastructure?
Cisco catches thousands of hidden threats on a massive public network
The GSMA Mobile World Congress in Barcelona, Spain, is the largest exhibition for a mobile industry. This year, Mobile World Congress attracted more than 107,000 attendees. But high profile, public...
See and respond in time to those pesky threats that cross the perimeter
If someone were to ask you if your network is secure, can you confidently say ‘yes’? Because that would mean you have a way to know if there’s been an...
Encrypted Traffic Analytics Receives “Miercom Performance Verified” Certification
Encryption is becoming an increasingly prevalent aspect of digital communications – even when it comes to malware. A Cisco analysis of more than 400,000 malicious binaries found that about
Cisco Enables Operators to See Inside the 5G Network to Protect Customer Data
New Stealthwatch for EPC allows an operator to quickly and easily identify, investigate and remediate internal and external data breaches across the mobile infrastructure.