All
insider threats

What are insider threats? Challenges, indicators, & more explained

Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the attack originates from behind...

jimd

Building a geo attack map with the Scrutinizer API

Every once in a while I get the opportunity to sit down and work on things that are outside of the box when it...

jeff

Cisco ASR 1001-X overloading QFP

Whether you work primarily on the networking side of the house or the security side, you’ll need to ingest metadata into at least one...

How can data theft be prevented?

Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “ majority of IT professionals have experienced at least one data...

traci

This is how I found out FaceApp was stealing my data

FaceApp is another selfie service that allows you to share aging and other filtered photos with your friends. It has been downloaded by millions...

joanna

Phishing detection: what not to do and how we help

Phishing attempts have been showing up a lot in the news lately and scammers are getting smarter. What can we do? What shouldn’t we...

elgin

SD-WAN visibility: key KPIs that enterprises identify

As enterprises seek to expand 5G/LTE or MPLS networks, they must set SLAs. Inside of those SLAs, key performance indicators (KPIs) drive the progression...

cybersecurity roundup Q

Q2 roundup: 13 interesting articles on cybersecurity news & expert opinions

Things move fast in cybersecurity, and it’s always worth investing time to stay up-to-date on the state of the field. Once again, I’ve gathered...

jake

How to streamline your network monitoring workflows with API integrations

In this industry, I’ve seen a common trend of buying best-in-breed solutions that are built for one or a few things instead of the...