All Network Operations

Host Reputation and Domain Reputation

It’s becoming more and more evident that an effective cyber threat incident response system requires the implementation and fine tuning of a variety of...

How to deploy a Flowpro Virtual Appliance

Today I want to talk about how to deploy a Flowpro Virtual Appliance. With the Flowpro Virtual Appliance, you can get that visibility into...

Incident Response to C2 Domain results in Disabling Google Chrome Prefetch

I got a call the other day that lead to a fast incident response relating to a C2 domain communication.  I thought I would...

How to Create Network Maps

Let’s face it: network maps are awesome.  At a glance, they provide details we need about how our network is connected, and which devices other devices...

NetFlow API

Providing detailed visibility and contextual awareness into network traffic is essential to secure and optimize business operations. While NetFlow and IPFIX reporting have proven...

Multi-layered security plan

You already understand the importance of having a multi-layered security plan if you read anything about cybersecurity.  We often talk about it on our blogs, too,...

Network Incident Response System

The network incident response system is a subset of the overall network management effort. Specifically, it addresses the word ‘reactive’ which has plagued the...

Indicator Of Compromise and Detection

Our network admin was made aware of a possible phishing email attack and at the same time reminded of the need for constant internal...

How to Detect DNS Data Breaches

The Domain Name System (DNS) is used to resolve human-readable hostnames like www.plixer.com into machine-readable IP addresses like 67.225.210.22. DNS also provides other information...