Threat intelligence feeds help us keep our networks secure and our engineers informed on the latest issues. Huge volumes of this data get published every day with details on the latest command-and-control schemes, malware, and malicious domains. There are many … [Read more...] about Integrating Threat Intelligence with Flow Data
In the wake of recent vulnerabilities with memcached, Distributed Reflection Denial of Service (DRDoS) is currently in the focus of public attention. Using this technique has generated some of the largest attacks seen to date. This blog will cover how you can … [Read more...] about What is Distributed Reflection Denial of Service?
Screen sharing applications have changed the landscape of the modern office. These tools allow users to remotely control another PC and receive image data that represents what the local user would see on their monitor. This greatly simplifies telecommuting, … [Read more...] about Identify Screen Sharing Network Traffic
Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of information via encryption, limiting data access to those who possess the correct key. … [Read more...] about Detecting IoT_Reaper with Network Traffic Intelligence
In the retail world, users at numerous branch locations, warehouses, and headquarters need access to information about products and the customers who buy them. As a result, these networks are geographically diverse and experience high traffic. All the while, … [Read more...] about Monitoring POS with Network Traffic Intelligence
With the ever-increasing scope of networks, engineers often need tools to help manage the workload. IPAM systems can organize your address space and DNS, while a network traffic analytics solution like Scrutinizer can help watch all activity. These systems are … [Read more...] about Network Management Integration with Infoblox IPAM