Cisco, Intel speed battlefield decision-making
Battlefield decisions have to be lightning quick. Thanks to Cisco and Intel, special operations forces can now have more information at their fingertips for making those judgment calls. At this...
#SHOWMESECURITY: Protect Network Assets with a Security Strategy
CCI’s Security Solution Director, Andy Erickson, gives a brief re-cap on the recent NTCA IP Vision event happening in St. Louis, MO. Much of the event’s conversations focused on cybersecurity and taking the next steps towards protecting network assets.
Lateral Movement “Whack-a-Mole”
Win with Network Monitoring The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs. Our incident responders recently worked with a client whose organization had been targeted with destructive […]
Harnessing the Power of NetFlow and Packet Analysis
NetFlow contains network traffic metadata (time, date, IP addresses, port number, etc.). Packet capture retains the packet payload, including user and application information. Together, they allow investigators to be more responsive to threat activity.
Payment Processor Secures Global Network with Stealthwatch
Elavon is the fourth-largest payment processing company in the world. They process more than 3 billion transactions annually, worth more than $300 billion. Elavon has more than a million customers and is a leading payment solutions provider for airlines and a top five provider for hospitality, healthcare, and retail. With a globally distributed network that […]
What if your network could do it all? Be digital-ready AND secure your business.
Networks today are supposed to be digital-ready, meaning fast and agile to propel business into a world where everything is connected. Getting there has hit some major speedbumps due to highly publicized hacks. And this has started a virtual arms race, where no expense is spared to deploy numerous, disparate security solutions. Yet somehow, the […]
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]
Protecting Clinical Devices – the Achilles Heel of Healthcare
Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomware attack. Cyber criminals can charge a hospital millions to unlock […]
Stealthwatch Learning Network License: The Workshop
Get an inside look at how Stealthwatch Learning Network License can transform your branch network router into a powerful security sensor and enforcer: one capable of quickly detecting threat activity and mitigating attacks, with little to no hands-on management needed.