All
briand

How to correlate Cisco Umbrella alerts with private IP addresses

The cloud-first movement is taking over every facet of information technology, and DNS is not excluded. There are tons of vendors that provide solutions...

annam

How to configure Viptela IPFIX exports

One of the perks of working in technical support is learning something new every day. For instance, just earlier today I was on a...

cybersecurity roundup Q

Q3 roundup: 14 interesting articles on cybersecurity news & expert opinions

2019 is flying by fast, and there were many developments in cybersecurity during the third quarter. From the rise of deepfakes and AI to...

scottr NAT blog

Is there a way to track and locate a private host behind NAT routers?

A common question that has been coming up on product demonstrations over the last few weeks is, using NetFlow, is there a way to...

adam

IPFIX reporting with F5 Big IP (part 2)

F5’s iRules are a powerful tool used to access information about the network traffic flowing through your load balancer. Using the Tools Command Language...

mikel

How to set up Scrutinizer single sign-on with Azure AD

Single sign-on (SSO) is a way to secure users while reducing the number of passwords they need to remember. SSO has been a highly...

insider threats

What are insider threats? Challenges, indicators, & more explained

Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the attack originates from behind...

jimd

Building a geo attack map with the Scrutinizer API

Every once in a while I get the opportunity to sit down and work on things that are outside of the box when it...