All
scottr

Can your network survive the coronavirus lockdown?

Lately, I have seen an increase in support calls regarding the increase in bandwidth consumption and the degradation of application performance seen when employees...

stephent

4 must-have reports for network traffic analysis

Where do I start? We all end up asking ourselves this question as we dive into a new platform and a sea of new...

traci

What you should know about Ryuk ransomware

Ryuk ransomware was discovered in August of 2018. Since then, over 100 US organizations have been affected. Knowing more about how Ryuk ransomware operates...

Cybersecurity’s role in digital transformation and brand

Digital transformation is crucial whether you lead a small business or an enterprise. But it’s hard to do, expensive, and unfortunately, the odds of...

jake

I installed Scrutinizer 100 times and here’s what I learned

As a Presales Engineer, I spend a good portion of my time helping with Scrutinizer installs and helping troubleshoot unique use cases for end...

Reporting on Microsoft O365 with flow data

When thinking about extracting maximum value from network metadata such as Netflow, IPFIX, SFlow, etc., data enrichment becomes extremely important. ...

cybersecurity roundup Q

Selling your genetic information, a Kansas farm turned digital nightmare, and more: Q4 ’19 cybersecurity roundup

We’ve reached our last roundup post of the year (and the decade!). This quarter’s interesting articles included yet another example of tech meant to...

scottr

Which NetFlow collection process is better: duplicated or deduplicated NetFlow?

Questions regarding deduplicated NetFlow often come up when beginning to research NetFlow solutions. This blog will address some of the reasons why deduplication might...