After you celebrate New Year’s Eve, it is time to get to work on those New Year's resolutions! It is also a good time to reflect, prepare for new challenges, and brush up on security threats to watch out for. In 2019, we expect new technologies and channels to … [Read more...] about The Top 7 Network Security Predictions for 2019
I want to introduce you to a very cool, very powerful search function for investigating IP Addresses.We talk all the time about how NetFlow and IPFIX technologies fit very well in the behavior analysis side of a layered security solution.NetFlow is a … [Read more...] about Using Host Indexing to Investigate IP Addresses
One of the most common cases we get up here in support is helping customers with their SSL certificates (or TLS or HTTPS domain, depending on your verbiage of choice). This is an easy task to perform. … [Read more...] about How to Enable SSL in Scrutinizer
As we've inched closer and closer to quantum computing, quantum cryptography has become a greater concern. We haven't yet created a quantum computer that's faster than the binary computers we use today, but it's possible that this will change within a few … [Read more...] about Quantum Cryptography Explained: Applications, Disadvantages, & How It Works
In my experience, most conversations on how to protect customer data revolve around active companies. Certainly important, but what about bankrupt companies? That data doesn’t simply disappear when the organization declares bankruptcy. And in many cases, the … [Read more...] about On Protecting Customer Data: What Happens After Bankruptcy?
Earlier this year I worked on a document that addressed some of the common misconceptions about Scrutinizer. One of the subjects that caught my attention was Scrutinizer’s ability to mitigate insider threats. Honestly, I really wanted to dig deeper on all the … [Read more...] about Three Strategies to Catch and Stop Insider Threats
Although the concepts of artificial intelligence and machine learning are not new, they have recently garnered mainstream attention. As is normal in the technology space, the initial hype makes it sound like a panacea and cybersecurity vendors are scrambling … [Read more...] about What is Machine Learning: The Hype, the Promise, and the Reality
Data silos, while common, are huge sources of inefficiency in any department or organization. This problem is exacerbated in IT, where any loss of time can incur huge costs. This blog will discuss, from the perspective of NetOps and SecOps, what data silos … [Read more...] about What is a Data Silo and Why is It Bad for Your Organization?
In today’s digital world, nothing is safe. Just today I came across this post that talks about hackers attacking network printers. It’s not far-fetched to think that your printers are a major cyberattack vector, but how can this type of attack affect your … [Read more...] about Network Security Concerns: They’re Attacking My Printers Now?
User attribution is one of the things I’m asked for most frequently by customers who are looking at network traffic analytics. The use case is quite simple. In a DHCP environment it can be really cumbersome to see who was actually logged in to a machine when … [Read more...] about Username Reporting – NetFlow Integration with ForeScout CounterACT