Showing posts with label Cognitive Threat Analytics. Show all posts
Showing posts with label Cognitive Threat Analytics. Show all posts

Tuesday, 2 July 2019

Cisco CCENT Certification: Jump start your career in the IT Networking Field

ICND1 and ICND2 are the most popular Cisco certifications that will qualify you to start your career as a network engineer. Some applicants prefer taking the composite exam, but some others prefer to take both the exams separately. ICND1 is the entry-level exam, and it qualifies you to...

Saturday, 23 December 2017

Introducing executive dashboards in CTA

No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats are affecting our network today?” and “how healthy is our network?” We have recently revamped the Cognitive Threat...

Monday, 18 December 2017

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection: ...

Wednesday, 13 December 2017

Analyzing Network Traffic with Encrypted Traffic Analytics

Today, knowing who is using your network is table stakes. What’s essential is knowing how the network is being accessed, what applications are being used, when they are used and most importantly, whether or not those applications are safe enough and compliant with your organization’s policies. Independent testing...

Wednesday, 6 December 2017

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

Some of us still intuitively believe that our extensively safeguarded corporate networks are safe from the risks we are exposed to when connecting directly to public Internet. Yet, evidence suggests that most companies now operate with significant persistent malware present in the network. At the same time, malware...

Monday, 4 December 2017

CMS Brute Force Attacks Are Still a Threat

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a...

Wednesday, 25 October 2017

Cisco Traffic Analysis & Encrypted Threat Analytics

Today, knowing who is using your network is table stakes. Knowing what users are consuming on the network is essential for analysis. What applications are being used, when they are used and most importantly are those applications are safe enough and compliant with your organization policies. Independent testing...