Lancope is now part of Cisco Learn More About Cisco
Attackers seek to breach the security measures of your organization which puts your organization at risk for a targeted attack. In Part 1 of this...
segmentation
In the rush for integrated security, we cannot afford to forget that human beings are an important part of the equation. They are a crucial component...
At Cisco Live , which ends today in Las Vegas, we revealed the latest features and improvements that accompany the release of Stealthwatch 6.8. We...
Today’s threats are more advanced than ever before, employing a variety of tactics to infiltrate their target networks and steal data. To combat...
https://flic.kr/p/cvNwF3
Cloud computing has become a truly disrupting force as more and more companies embrace it for improved business mobility and agility. External cloud...
Domain Name System (DNS) servers are critical to the operation of networks and the Internet as a whole. DNS servers are used to convert human...
Two weeks ago, I presented at the Gartner Security & Risk Management Summit on the value of security analytics. In 2015 alone, there were 781...
In many organizations, incident response generally consists of identifying malware infections and cleaning up the affected machines. This is, of...
Today’s threat landscape has become far more complicated and dynamic. Trends such as mobility, the cloud, and the Internet of Things (IoT) have...
In the context of malicious activity, beaconing is when traffic leaves the network at regular intervals to contact a command-and-control (C&C)...
The Department of Homeland Security’s Continuous Diagnostic and Mitigation (CDM) program aims to help government agencies identify cybersecurity...
https://flic.kr/p/cvNwF3
Over the past few years, cloud computing has seen an explosion in interest, and as more organizations learn of the flexibility, agility, scalability...

Pages