Many types of malware can be uncovered simply by cross referencing the internet hosts your internal users are connecting to with an IP address reputation or domain reputation database. This post discusses the easiest way to do this. … [Read more...] about IP Address Reputation – How to Discover Malware
The Cisco ASA Cyber Threat Defense solution is made up of 3 components. The first is a basic network threat detection tool and is enabled by default on all ASA's with 8.0(2) or later firmware. Basic threat detection monitors the rate at which packets are … [Read more...] about Cisco ASA Cyber Threat Defense: Part 1
In many cases, previously unidentified malware and back doors were identified through the use of these indicators in both network traffic and host-based information. The combination of both host- and network-based indicators continues to be the most reliable … [Read more...] about Internet Threat Defense Solution: Part 3
Plixer is pleased to announce a new weapon in the war against Internet threats: the all new Internet Threat Center (ITC). Based on hundreds of observation points deployed across the Internet, the ITC provides a near-realtime view of malicious actors across the … [Read more...] about Introducing Plixer’s Internet Threat Center (ITC)
Today’s threat detection and intrusion prevention systems deployed at companies concerned with cybercrime utilize a layered approach to network protection. Anti-virus programs are deployed on every end system and server. Most of us have access lists on … [Read more...] about Intrusion Prevention : Protect Intellectual Property!
The Flame threat is basically a virtual, digitized spy tool that does what a human spy would do: recording phone calls, snapping photos, and siphoning information. Often times this traffic pattern to the internet is initiated by the infected host and … [Read more...] about How to Detect Flame: Host Reputation