How do hackers become insiders who are able to move around and manipulate such a secure network?
Bingham: We use what we call the physics of networks to recognize when unusual activity is taking place. Our knowledge of networks allows us to establish the same physical layout for all of them. We don’t even need a baseline of data. We could come in today and immediately tell you if there was suspicious activity. Right now, Cisco’s big problem — aside from the egg on their face — is that they don’t know how much of their network was compromised. It’s like coming home and knowing a burglar was in your house, but you can’t be sure what they did or what else they might have taken. They’re going to have to spend a lot of time and money combing every inch of their systems. That’s not a small job. We would be able to tell them immediately where the intruder had likely been and what they did while they were in there.