General Posts

General

Why Is My Computer Connecting to Akamai Technologies?

Once in a while, I perform a cleanup of my personal computer that involves removing unnecessary and unwanted applications.

Read More
General

Cisco Nexus 9000 NetFlow Configuration

Cisco Nexus 9000 NetFlow Configuration Recently I’ve received numerous request for a sample on the Cisco Nexus 9000 NetFlow

Read More
General

Use Your Surveillance Cameras to Investigate Malware

If you suspect a malware breach and want to investigate the history of a specific host, how do you do it?

Read More
Configuration

VMware DFW IPFIX Support

The VMware DFW (Distributed Firewall) is part of the NSX feature set and provides a way to manage which

Read More
General

Cisco ASA FireSIGHT Reporting

We will be demonstrating our new Cisco ASA FireSIGHT reporting at CiscoLIVE! in Berlin Germany this month. This appliances

Read More
General

Find IP Addresses in Seconds across Terabytes of NetFlow and IPFIX

Do you need to search for a single IP address across trillions of flows?  The ideal system for enterprise

Read More
General

LinkedIn Malware : Safe Browsing

As we enter 2016 please remember to browse safely. Many users have a tendency to click on links without

Read More
General

ZyXEL sFlow Configuration

Today we’ll focus on  ZyXEL sFlow Configuration, in order for the switch to monitor traffic and export sFlow to a collector

Read More
General

VTech Breach, Hacking Barbies, and Internet of Things Security

Late last month on Black Friday, Hong Kong-based toymaker VTech suffered a data breach.  Sure, we can just dump

Read More
General

Host Reputation and Domain Reputation

It’s becoming more and more evident that an effective cyber threat incident response system requires the implementation and fine

Read More