All
mikel

How to set up Scrutinizer single sign-on with Azure AD

Single sign-on (SSO) is a way to secure users while reducing the number of passwords they need to remember. SSO has been a highly...

insider threats

What are insider threats? Challenges, indicators, & more explained

Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the attack originates from behind...

jimd

Building a geo attack map with the Scrutinizer API

Every once in a while I get the opportunity to sit down and work on things that are outside of the box when it...

jeff

Cisco ASR 1001-X overloading QFP

Whether you work primarily on the networking side of the house or the security side, you’ll need to ingest metadata into at least one...

How can data theft be prevented?

Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “ majority of IT professionals have experienced at least one data...

traci

This is how I found out FaceApp was stealing my data

FaceApp is another selfie service that allows you to share aging and other filtered photos with your friends. It has been downloaded by millions...

joanna

Phishing detection: what not to do and how we help

Phishing attempts have been showing up a lot in the news lately and scammers are getting smarter. What can we do? What shouldn’t we...

elgin

SD-WAN visibility: key KPIs that enterprises identify

As enterprises seek to expand 5G/LTE or MPLS networks, they must set SLAs. Inside of those SLAs, key performance indicators (KPIs) drive the progression...