Blog - Topic

Cybersecurity

Why network metadata is just right for your data lake

By
Kevin Sheu
April 30, 2019
Read blog post

Confronting risk and exposure in healthcare networks

By
Chris Morales
April 24, 2019
Read blog post

Lurking in the shadows: Top 5 lateral spread threat behaviors

By
Kevin Sheu
April 1, 2019
Read blog post

Visibility, detection and response using a SIEM-less architecture

By
Chris Morales
March 20, 2019
Read blog post

Most attacks against energy and utilities occur in the enterprise IT network

By
Chris Morales
November 1, 2018
Read blog post

Enquête de la conférence Black Hat 2018: le temps et les compétences avant tout

By
Chris Morales
September 20, 2018
Read blog post

Breaking ground: Understanding and identifying hidden tunnels

By
Cognito
July 11, 2018
Read blog post

The alarming surge in cryptocurrency mining on college campuses

By
Chris Morales
March 29, 2018
Read blog post

Piratage du protocole BGP: le trafic redirigé vers la Russie

By
Francis Ia
December 21, 2017
Read blog post

BGP hijackers: “This traffic is going to Russia!”

By
Chris Morales
December 14, 2017
Read blog post

Das Gute, das Böse und die Anomalie

By
Hitesh Sheth
November 24, 2017
Read blog post

Je suis Cognito, l'intelligence artificielle au service de votre SOC

By
Cognito
November 21, 2017
Read blog post

Une intégration étroite entre la sécurité des terminaux et celle du réseau permet de neutraliser les attaques

By
Kevin Kennedy
October 4, 2017
Read blog post

Gain Visibility and Automate Threat Hunting in the Cloud with Gigamon and Vectra

By
Chris Morales
September 13, 2017
Read blog post

Man + machine is the winning combo for combating cyber threats

By
Chris Morales
August 10, 2017
Read blog post

Es ist in Ordnung, sich von Cisco ETA nicht beeindrucken zu lassen

By
Oliver Tavakoli
June 29, 2017
Read blog post

Goldeneye. Petya. WannaCry. It's all ransomware.

By
Chris Morales
June 28, 2017
Read blog post

Wie Cyber-Kriminelle in Unternehmensnetzen Angriffe vorantreiben

By
Angela Heindl-Schober
June 22, 2017
Read blog post

Mangel an IT-Sicherheitsexperten spitzt sich zu

By
Gérard Bauer
June 13, 2017
Read blog post

The existential threat of IP theft

By
Kevin Kennedy
April 20, 2017
Read blog post

Don't blow your IT security budget on flow analysis

By
Hitesh Sheth
April 10, 2017
Read blog post