[Blog authored by Aaron Weis and Samuel Wigley] Cisco has been measuring our security products’ median “time to detection” (TTD) — the window of time between a compromise and detection of a threat — since 2015. This exercise is a way for us to
Once an organization has deployed technology infrastructure that enables visibility into the network (discussed in the first part of this blog), that organization now requires the properly trained security personnel to bring that time to detection
A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must