Given the size of Amazon’s customer base, it is probably one of the largest Internet sites targeted by hackers. As of 2014, the company claimed to have over 244 million customers two years later, we can only guess that it has probably stretched to over 300 million.
If you suspect a malware breach and want to investigate the history of a specific host, how do you do it? For most of us, the turn-to technology when needing to forensically investigate nearly any type of network related traffic pattern is NetFlow or IPFIX. All major routers on the market today support one or both of these flow protocols.
Do you need to search for a single IP address across trillions of flows? The ideal system for enterprise NetFlow collection should allow you to simply type in an IP address and within 2-3 seconds, it should serve up the results being sought after.
Is your company detecting iPhone malware that is brought into the internal network? At least 39 iPhone apps found on the Apple Apps Store were infected by XcodeGhost. These applications apparently made it past Apples code review process and impacted hundreds of millions of iOS users!
If you have ever wondered how the DNS works, this post was put together by three of us plixer dudes who wanted a DNS process overview as well as insight into many of the acronyms that accompany this protocol. Lets say for example you point your browser to www.example.com, what happens from your computer? This Overview of DNS Protocol will answer that question.
I set out today to write about Cisco ART metrics as I was having trouble understanding the difference between it and technologies such as AVC, MACE and Performance Monitoring as all of them can be exported using Flexible NetFlow. As I read different materials found on Cisco’s Web site, I became even more confused. Hate when that happens.
The all-inclusive temperature monitoring software ideally goes beyond temperature readings. A temperature monitoring system should also monitor for several other environmental attributes including humidity, water, smoke and especially air flow among other factors. We purchase our sensors from Ravica.
I’m excited to announce that the Alarms tab in our next version of our network threat detection solution will include index enhancements. Specifically, the “Threat Index” is a value placed on any host that our propriety threat detection algorithms mark as suspicious. The concept of a threat index or security index is not new. It has been around for many years and is leveraged by different industries such as the Weather Channel. However the way we employed the threat index is unique in our industry.
Today, many IDS, IPS, and IT Security Forensics vendors purport that most threats are best combated using their Signature-based solutions. Well ‘best’ may be only a small Read more