stealthwatch

November 5, 2019

SECURITY

Securing Your Future by Innovating Today

To reduce security complexities, accelerate cloud adoption and provide breach defense everywhere, Cisco created a comprehensive platform approach and introduces a series of innovations across its security portfolio.

September 30, 2019

SECURITY

Threats in encrypted traffic

There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was...

August 13, 2019

GOVERNMENT

Cybersecurity for Federal Networks: It All Starts with Visibility

Staying secure means ensuring deeper visibility into your network. But visibility must go beyond the mere identification of packet flows. User identity should also be linked to packet flows wherever possible. Find out what that means in our latest blog on Cybersecurity in government.

May 2, 2019

SECURITY

Incident response: Putting all the R’s in IR

It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.”

April 17, 2019

INSIDE CISCO IT

AI in Cisco IT Operations: Finding Golden Needles in Ever Larger Haystacks

Customers often ask us whether artificial intelligence (AI) will be the kind of game changer that analysts are predicting. From what I’m seeing, the answer is an unconditional yes.  ...

January 14, 2019

SECURITY

SMB and the return of the worm

Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one...

November 16, 2018

SECURITY

Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud

Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a...

September 6, 2018

SECURITY

Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster

Cisco Stealthwatch Cloud provides an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. Here's how easy it is to deploy into an existing K8s cluster.

August 2, 2018

SECURITY

Why download the exploit, when you can carry it with you?

For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS).