218 results
hands on keyboard in the dark
/ Michael Wetherbee

Defending Against DDoS Attacks at Scale

For global financial institutions, digital availability is not optional—it is foundational to trust, revenue, and regulatory compliance. When customer-facing services are expected...

  • DDoS
  • Security
People walking around tradeshow floor
/ Heather Broughton

NETSCOUT to Have a Strong Presence at Cisco Live

When it comes to everything artificial intelligence (AI), the network is key. That is why this year’s Cisco Live theme is— the network as the foundation of the AI era! And in a bit...

  • AIOps
  • DDoS
  • Enterprise
  • Event
  • Security
Executive reviewing data from laptop
/ Robert Derby

Why AI, Zero Trust, and Modern Security Require Deep Visibility

AI. Automation. Zero Trust. They dominate every security strategy document. But there’s a truth sitting underneath all three: none of them work without deep, trustworthy visibility...

  • Security
Woman on laptop with hand folded on her face
/ Robert Derby

The 10-Hour Problem: How Visibility Gaps Are Burning Out the SOC

Security teams aren’t drowning because the threats improved. They’re drowning because the visibility got worse. The October 2025 commissioned Forrester Consulting study conducted...

  • Security
Woman looking at mobile device on a moving walkway at airport
/ Heather Broughton

From Insight to Impact: Observability Fuels AI-Driven Innovation

As Barcelona prepares to serve up both tapas and terabytes, the Mobile World Congress (MWC) is once again turning this sun-drenched city into the global capital of 5G connectivity...

  • AIOps
  • DDoS
  • Event
  • Service Provider
Woman on laptop in datacenter
/ Anthony Cote

How Orphaned Applications Are Quietly Fueling Your Shadow IT Problem

Orphaned applications are a significant driver of shadow IT and a major headache for asset and identity management. We all know the drill: an account should have been deprovisioned...

  • Enterprise
  • Security
2 people in SOC watching monitors
/ Robert Derby

Why Today’s Security Tools Can’t See the Network Anymore

There’s a simple reason modern security feels harder than it used to: the architecture changed, and visibility didn’t keep up. An October 2025 commissioned study conducted by...

  • Security
Purple World Image
/ Robert Derby

How Hidden Blind Spots Quietly Became Cybersecurity’s Biggest Vulnerability

Most security programs don’t fail because leaders make bad decisions. They fail because leaders make decisions without enough clarity. And clarity is exactly what modern...

  • Security
2025 Cybersecured Award blog header
/ Robert Derby

NETSCOUT’s Omnis Cyber Intelligence Earns Security Today’s 2025 CyberSecured Award

In less than the time it takes to pour yourself a cup of coffee, a cyberattack will occur. According to a recent academic study, cyberattacks happen roughly every 39 seconds...

  • Security
NETSCOUT Recognized leader in NDR
/ Robert Derby

NETSCOUT Recognized for Leadership in Network Detection and Response

We’re proud to share that NETSCOUT has been recognized for industry-leading excellence in network detection and response (NDR). This acknowledgment, from Quadrant Knowledge...

  • Security
woman at computer in datacenter
/ Anthony Cote

Seeing Clearly with Deep Packet Inspection at Scale

Every organization depends on digital services that must stay available and secure. The margin for error is getting smaller. More clouds, more devices, and more threats mean...

  • AIOps
  • Enterprise
  • Security
2 people reviewing data on 4 monitors in SOC
/ Robert Derby

The Next Phase of Attacks and the Blind Spots We Must Address

On October 15, 2025, a major network infrastructure provider disclosed a sophisticated cybersecurity incident in which a nation-state threat actor maintained long-term...

  • Security