All cyber attack incident response

Catch Reflection DDoS Attacks with NetFlow

In this line of work I find myself talking with network professionals daily. With this constant exposure to a variety of network environments and...

Detecting DROWN attack

Chances are that unless you are a hermit or have turned yourself into an air-gapped server, you have heard the term “DROWN” kicking around...

4 Benefits of NetFlow and 1 BIG Problem

Are you facing a growing communication infrastructure and needing greater insight into all corners of the network? NetFlow has become the turn to technology...

Cyber Incident Response Plan (Part 3)

Every day we see more and more stories about security breaches across the globe. With there being so many new cyber security threats coming...

Cyber Incident Response Plan (Part 2)

In my previous blog, I talked about the value of having a cyber incident response plan.  An important factor in a plan like this is having...

Cyber Incident Response Plan (Part 1)

The value of your cyber incident response plan becomes stronger as various global incidents unfold.  Just today, I was going through my news feeds and...

How To Investigate Malware

If you are looking to learn about how to investigate malware, chances are you’re already infected and under the gun to uncover the source...

4 Key Focuses of Cyber Attack Incident Response

You know that your company is carrying infections that your threat detection systems haven’t unearthed. Malware is sitting on a host in some corner...

FBI Warns the Health Care Industry to Beef Up Cyber Security

When looking for an easy meal, predators often go after the weakest animal in the herd. The same often holds true for cyber criminals....

Cyber Attack Incident Response

This year many companies have come to the realization that somewhere on their network, possibly in a far off corner hidden behind a pile...