All Security Operations
briand

Username reporting: NetFlow integration with Splunk

I was recently able to explore the Splunk software development kit with a customer. This helped me to implement another way to get username...

scottr

How to detect suspicious ICMP traffic

A few years ago, we added a behavioral algorithm to Plixer Scrutinizer that looked at all the flow data that was collected and determined...

khalil

How to detect a reverse SSH tunnel

Today we are going to talk about Plixer’s new Flow Analytics algorithm, Reverse SSH Shell, which has been included in the latest Plixer Scrutinizer...

dylan

STIX/TAXII for threat intelligence

What is STIX/TAXII? STIX stands for Structured Threat Information Expression, which is an open-source language and serialization format used in sharing threat intelligence. Think...

jimd

Enhance NetOps/SecOps collaboration with Plixer’s new collections feature

I can’t tell you how many calls I’ve been on where the NetOps and SecOps teams really don’t know what the other is doing....

elgin

How to detect bogon connections

Many ISPs filter bogon connections because bogon IP addresses have no legitimate use. If you find a bogon or bogus IP address in your...

jake

Detecting IP spoofing with Plixer Scrutinizer and Endpoint Analytics

A common tactic for bad actors to get a foothold into the network is to leverage IP spoofing to either: Regardless of the intention,...

jeffmonaco

An “A-list” ransomware attack

How safe is your personal information? Well, several celebrity clients of a New York law firm have discovered that it’s only as safe as...

How to build data governance into your security strategy

How do you know who’s accessing your data? Do you know if your data has been copied to other locations? Have you put enough...

cybersecurity roundup Q

A “cursed” domain, a biodata bill of rights, and more: Q1 ’20 cybersecurity roundup

In our first roundup post of the decade, I’ve included interesting articles whose topics include hacking satellites, the difference in mindset between technologists and...