ICND1 and ICND2 are the most popular Cisco certifications that will qualify you to start your career as a network engineer. Some applicants prefer taking the composite exam, but some others prefer to take both the exams separately. ICND1 is the entry-level exam, and it qualifies you to...
Showing posts with label Cognitive Threat Analytics. Show all posts
Showing posts with label Cognitive Threat Analytics. Show all posts
Tuesday, 2 July 2019
Saturday, 23 December 2017
Introducing executive dashboards in CTA
No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats are affecting our network today?” and “how healthy is our network?” We have recently revamped the Cognitive Threat...
Monday, 18 December 2017
Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics
Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection: ...
Wednesday, 13 December 2017
Analyzing Network Traffic with Encrypted Traffic Analytics
Today, knowing who is using your network is table stakes. What’s essential is knowing how the network is being accessed, what applications are being used, when they are used and most importantly, whether or not those applications are safe enough and compliant with your organization’s policies. Independent testing...
Wednesday, 6 December 2017
Cognitive Threat Analytics: Turn Your Proxy Into Security Device
Some of us still intuitively believe that our extensively safeguarded corporate networks are safe from the risks we are exposed to when connecting directly to public Internet. Yet, evidence suggests that most companies now operate with significant persistent malware present in the network. At the same time, malware...
Monday, 4 December 2017
CMS Brute Force Attacks Are Still a Threat
Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a...
Wednesday, 25 October 2017
Cisco Traffic Analysis & Encrypted Threat Analytics
Today, knowing who is using your network is table stakes. Knowing what users are consuming on the network is essential for analysis. What applications are being used, when they are used and most importantly are those applications are safe enough and compliant with your organization policies. Independent testing...