Blog
Search blog posts
Choose a Category

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit
In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have demonstrated the value of metadata in understanding and mitigating these evolving threats. For those keen to delve deeper into this threat landscape, I recommend downloading our

The Impact of a Data Breach
Dive into the recent HCA data breach and learn how a zero-day attack can quickly cause damage to your business.

What is the MOVEit Vulnerability and How To Detect It
By now you have probably heard of a vulnerability in MOVEit or its use by the hacking group ClOp. This cyber attack is all over the news at the moment, with large government agencies and enterprises being affected by the MOVEit vulnerability. If you found this blog post, then you

Endpoint security stats you need to know
Endpoint security is crucial for protecting your organization from cyber threats. With the increasing vulnerabilities posed by human actions, it’s essential to have key insights into endpoint behavior.

Is NetFlow useful for security analysis?
Network flow data (NetFlow, IPFIX, sFlow, etc.) is telemetry data extracted from your network infrastructure. Network Operations teams frequently tap into this data set to monitor performance.

What is Deep Network Observability?
Network Observability is the ability to collect, analyze, and activate network data. With network observability, you can easily answer questions about your network. Deep Network Observability takes it a step further by extracting data from other sources interacting with your network to provide actionable insight from your entire IT environment.