{"id":1295,"date":"2024-12-18T13:33:40","date_gmt":"2024-12-18T13:33:40","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1295"},"modified":"2024-12-18T13:33:40","modified_gmt":"2024-12-18T13:33:40","slug":"cisco-grabs-snapattack-for-threat-detection","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1295","title":{"rendered":"Cisco grabs SnapAttack for threat detection"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Cisco is acquiring threat-detection startup SnapAttack for an undisclosed amount as it continues to\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2514928\/cisco-adds-heft-to-cybersecurity-push-with-acquisitions-new-talent.html\">expand its security portfolio<\/a>.<\/p>\n<p>Established in 2001 by Booz Allen\u2019s Dark Labs, SnapAttack is known for its threat detection and engineering technology, which melds threat intelligence, attack emulation, and behavioral analytics to help customers identify potential vulnerabilities and gaps in their networks, ideally before problems happen.\u00a0<\/p>\n<p>Continue reading on <a href=\"https:\/\/www.networkworld.com\/article\/3626637\/cisco-grabs-snapattack-for-threat-detection.html\">Network World<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cisco is acquiring threat-detection startup SnapAttack for an undisclosed amount as it continues to\u00a0expand its security portfolio. Established in 2001 by Booz Allen\u2019s Dark Labs, SnapAttack is known for its threat detection and engineering technology, which melds threat intelligence, attack emulation, and behavioral analytics to help customers identify potential vulnerabilities and gaps in their networks, [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1296,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1295","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1295"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1295"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1295\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1296"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}