Incident response: Putting all the R’s in IR
It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.”
AI in Cisco IT Operations: Finding Golden Needles in Ever Larger Haystacks
Customers often ask us whether artificial intelligence (AI) will be the kind of game changer that analysts are predicting. From what I’m seeing, the answer is an unconditional yes. ...
Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud
Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a...
Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster
Cisco Stealthwatch Cloud provides an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. Here's how easy it is to deploy into an existing K8s cluster.
Why download the exploit, when you can carry it with you?
For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS).
Encrypted Botnets and cryptomining spotted at Cisco Live
More than 25,000 attendees visited Cisco Live in Orlando this year. While this large concentration of network and security professionals was learning about our latest innovations, Cisco Security was busy...
Easily detect threats and risks for Google Cloud Platform
Cisco Stealthwatch Cloud has provided end-to-end visibility and threat detection in on-premises networks for years, but it can also deploy easily in other platforms, including Google Cloud Platform (GCP) and Kubernetes-based environments.
Scaling Visibility and Security within the Operational Technology (OT) Environment
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS,...