security
Step-by-Step Setup of ELK for NetFlow Analytics
10 min read
Contents Intro Java Elasticsearch Logstash Kibana Intro The ELK stack is a set of analytics tools. Its initials represent Elasticsearch, Logstash and Kibana. Elasticsearch is a flexible and powerful open source, distributed, real-time search and analytics engine. Logstash is a tool for receiving, processing and outputting logs, like system logs, webserver logs, […]
Creating a More Secure Internet
1 min read
Trust is a fundamental requirement for people to use the Internet with confidence, and Cisco continues to find opportunities to make the Internet even more secure. I am happy to share that we are a founding sponsor of a new public benefit consortium called the Internet Security Research Group (ISRG). The goal of the ISRG […]
Endpoint Protection and Least Prevalence
2 min read
Let’s face it, malware is everywhere now, and it’s here to stay. The statistics are staggering. According to the 2014 Cisco Annual Security Report, “100 percent of the business networks analyzed by Cisco had traffic going to websites that host malware” and 96 percent of the business networks analyzed had connections to known hijacked infrastructure […]
Minimize Threats from Non-Corporate Mobile Apps
2 min read
Our customers are continuing to feel the pain of having to increasingly support off-premise mobile devices like smartphones and tablets. The critical need to rapidly onboard these devices to connect to corporate services and applications pretty clearly provides business with a competitive advantage (Cisco Enterprise Mobility Landscape Wave II Study – April 2014) in improving […]
The Value of Endpoint and Network Protection Together
2 min read
As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack vectors, take endless form factors, and launch attacks over time. […]
File Security With the Click of a Button
3 min read
Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, file exchange has […]
Can the Elephant Dance to a Security Tune?
2 min read
There is a great debate in the security world right now: have SIEM and logging products run their course? Will Hadoop ride to the rescue? Can machines “learn” about security and reliably spot threats that no other approach can find? Gartner calls this phenomenon Big Data Security Analytics, and they make a strong point to […]
The New Face in CyberSecurity
1 min read
The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner. With the Internet of Everything and cloud computing, CyberSecurity must be […]
Endpoint Visibility is Key to Combatting Attacks
2 min read
As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used in the workplace are expanding, which […]
6