In our newest Cybersecurity Report, we explore the ins and outs of threat hunting and provide a how-to guide for creating a threat-hunting team at your organization. With clear, easy-to-follow instructions and tips from veteran threat hunters, it is a must-read for cybersecurity professionals everywhere.
To protect your data, you must understand the traffic on your network. This task has become even more challenging with the widespread use of the Transport Layer Security (TLS) protocol, which inhibits traditional network security monitoring techniques.
It has been a year since last RSAC when I became head of the Cisco Security Business Group. During this time, we have greatly expanded the number of customers we both serve and protect while continuing to deliver market-leading innovation keeping ahead of today’s threats.