With billions of devices coming online yearly, the world of IoT (Internet of Things) is upon us. Unfortunately, like any new technology, form and function greatly outweigh security, leaving businesses and individuals exposed. Due to this general disregard early on, IoT security with NetFlow is quickly becoming a focus and pushing companies into better monitoring practices.
With cellular networks taking over the world and nearly every person joining team Apple or Android, it’s easy to see why the evildoers of the world are taking advantage of the boom and riddling us with malware-infested phones and apps. The scary part is that these phones could be on your network as we speak.
It seems like every day I talk with network professionals about security and performance, the common theme being speed and ease of use. Having an effective incident response solution is paramount and with more and more vendors supporting NetFlow, it has never been easier.
With the holidays right around the corner, the conditions for phishing couldn’t be better. Order verification, delivery confirmation, emails that look and feel important but are actually hiding a sinister, Grinch-like objective… With holiday phishing scams in full effect, let’s take a look at how we can prepare ourselves this season and keep our information safe!
If you are into cyber security and reading this blog then there is a good chance you have heard of USA Network’s hit show, Mr Robot. The crime drama has a plethora of relatable characters, a ton of action-packed scenes, and most importantly, realistic hacking scenarios.What the show doesn’t discuss, however, is how catching Mr Robot with NetFlow is a very real possibility. (Warning: spoilers ahead.)
In this line of work I find myself talking with network professionals daily. With this constant exposure to a variety of network environments and people, certain terms tend to float to the surface. Lately DDOS and Reflection DDoS attacks are on the threats to discuss. They are becoming easier to conduct and larger in scale, and due to the lack of network visibility we can clearly see why there would be an upward trend in the frequency of attacks. Today we are going to take a look at a member of the denial of service family, DRDoS (Distributed Reflection Denial of Service) attacks and how we can harness the power of NetFlow to catch and monitor these attacks.
Monitor Pokemon Go Network Traffic
So there I am monitoring my network with NetFlow and a wild application appears! Pokemon GO hit the scene last week and it’s quickly becoming one of the most popular applications to hit networks. Most network professionals are interested in seeing what applications are in their environment and who is using them. In the spirit of catching them all, I set out to find Pokemon GO network traffic with NetFlow.
In an industry that is ever growing and becoming more and more spread out worldwide, it has become a network professionals responsibility to manage and keep track of their expanding network. A global network map coupled with Flow technology should fit the bill quite nicely.
Chances are that unless you are a hermit or have turned yourself into an air-gapped server, you have heard the term “DROWN” kicking around cyberspace. I know that when I see article after article stating that 11 million HTTPS websites are at risk, I tend to get bright-eyed and bushy-tailed. Let’s take a closer look at DROWN and see if your server should be added to that growing list.