All
cybersecurity roundup Q

Q3 roundup: 14 interesting articles on cybersecurity news & expert opinions

2019 is flying by fast, and there were many developments in cybersecurity during the third quarter. From the rise of deepfakes and AI to...

scottr NAT blog

Is there a way to track and locate a private host behind NAT routers?

A common question that has been coming up on product demonstrations over the last few weeks is, using NetFlow, is there a way to...

adam

IPFIX reporting with F5 Big IP (part 2)

F5’s iRules are a powerful tool used to access information about the network traffic flowing through your load balancer. Using the Tools Command Language...

mikel

How to set up Scrutinizer single sign-on with Azure AD

Single sign-on (SSO) is a way to secure users while reducing the number of passwords they need to remember. SSO has been a highly...

insider threats

What are insider threats? Challenges, indicators, & more explained

Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the attack originates from behind...

jimd

Building a geo attack map with the Scrutinizer API

Every once in a while I get the opportunity to sit down and work on things that are outside of the box when it...

jeff

Cisco ASR 1001-X overloading QFP

Whether you work primarily on the networking side of the house or the security side, you’ll need to ingest metadata into at least one...

How can data theft be prevented?

Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “ majority of IT professionals have experienced at least one data...