All
traci

What you should know about Ryuk ransomware

Ryuk ransomware was discovered in August of 2018. Since then, over 100 US organizations have been affected. Knowing more about how Ryuk ransomware operates...

Cybersecurity’s role in digital transformation and brand

Digital transformation is crucial whether you lead a small business or an enterprise. But it’s hard to do, expensive, and unfortunately, the odds of...

jake

I installed Scrutinizer 100 times and here’s what I learned

As a Presales Engineer, I spend a good portion of my time helping with Scrutinizer installs and helping troubleshoot unique use cases for end...

Reporting on Microsoft O365 with flow data

When thinking about extracting maximum value from network metadata such as Netflow, IPFIX, SFlow, etc., data enrichment becomes extremely important. ...

cybersecurity roundup Q

Selling your genetic information, a Kansas farm turned digital nightmare, and more: Q4 ’19 cybersecurity roundup

We’ve reached our last roundup post of the year (and the decade!). This quarter’s interesting articles included yet another example of tech meant to...

scottr

Which NetFlow collection process is better: duplicated or deduplicated NetFlow?

Questions regarding deduplicated NetFlow often come up when beginning to research NetFlow solutions. This blog will address some of the reasons why deduplication might...

jeffs

IoT security and your network

The Internet of Things (IoT) market is booming. Gartner predicts that 5.8 billion IoT endpoints will be in use in 2020, marking a year-over-year...

endpoint security

Endpoint security explained: challenges and best practices for businesses

If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins...

mikel

Windows 7 end of life is here: how to monitor Windows 7 traffic

Are you ready for the end? January 2020 it will come to an end. We all knew it was coming. But what now? Servers...