All

How to build data governance into your security strategy

How do you know who’s accessing your data? Do you know if your data has been copied to other locations? Have you put enough...

elgin

Support criteria for SD-WAN vendors

As OEMs continue to invest in WAN optimization, what differentiates vendors’ capabilities so that enterprises seek to scale their infrastructure? In this blog, we’ve...

jake

Slickwraps breach and metadata analysis

In a new series of blogs, we will go over some recent data breaches and how metadata analysis could have helped with the detection...

briand

Top five VPN monitoring use cases

With the dramatic shift to work from home, Plixer has been working with people all over the globe to visualize VPN traffic in a...

scottr

Troubleshooting NetFlow over VPN tunnel

I was working with a customer last week who had configured NetFlow on four of their Cisco routers. They had applied basically the same...

jimd

Are you looking for an easier way to see how your VPNs are being used on your network? Here’s how to do it.

Who has the time, right? You might laugh but the truth is, in the past few weeks you have become the guru of everything...

cybersecurity roundup Q

A “cursed” domain, a biodata bill of rights, and more: Q1 ’20 cybersecurity roundup

In our first roundup post of the decade, I’ve included interesting articles whose topics include hacking satellites, the difference in mindset between technologists and...