The cloud-first movement is taking over every facet of information technology, and DNS is not excluded. There are tons of…
Blog
How to configure Viptela IPFIX exports
One of the perks of working in technical support is learning something new every day. For instance, just earlier today…
Q3 roundup: 14 interesting articles on cybersecurity news & expert opinions
2019 is flying by fast, and there were many developments in cybersecurity during the third quarter. From the rise of…
Is there a way to track and locate a private host behind NAT routers?
A common question that has been coming up on product demonstrations over the last few weeks is, using NetFlow, is…
IPFIX reporting with F5 Big IP (part 2)
F5’s iRules are a powerful tool used to access information about the network traffic flowing through your load balancer. Using…
How to set up Scrutinizer single sign-on with Azure AD
Single sign-on (SSO) is a way to secure users while reducing the number of passwords they need to remember. SSO…
Security orchestration advantages with Plixer
If this ever changin’ world in which we live in makes you give in and cry say I’m only one…
What are insider threats? Challenges, indicators, & more explained
Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the…
Building a geo attack map with the Scrutinizer API
Every once in a while I get the opportunity to sit down and work on things that are outside of…
Cisco ASR 1001-X overloading QFP
Whether you work primarily on the networking side of the house or the security side, you’ll need to ingest metadata…