All
joanna

How to Protect Your Network Against the ‘Sea Turtle’ DNS Hijacking Campaign

A large-scale DNS hijacking campaign called ‘Sea Turtle’ has been spreading across more than 13 countries. With our FlowPro Defender, you can monitor your...

Virtualization Monitoring: How to Gain Visibility into Your Virtual Environment

Virtualization offers many benefits to organizations. But at the same time, you’ll have to figure out how to monitor your virtual environment, because a...

Protecting your network from IoT peer-to-peer vulnerabilities

In a recent article on Dark Reading, it was revealed that millions of IoT devices were exposed to a peer-to-peer (P2P) vulnerability. Given how...

traci

How to Enable AppFlow from CLI

Citrix NetScalers provide a feature called AppFlow. AppFlow allows Netscaler devices to export flow data to collection tools, often to be used for network/security...

jake

Using your network as a sensor

I spent a lot of time talking to customers at RSA 2019 and a message that resonated with a lot of them was using...

briand

Why Data Enrichment Matters with NetFlow

Do you wanna build a NetFlow? Doesn’t have to be a NetFlow… Network metadata (NetFlow, IPFIX, sFlow, etc.) provides a wealth of information about...

annam

5 Reasons Service Providers Choose Scrutinizer

As a technical support engineer, I have worked with hundreds of customers across the globe. I typically ask them why they choose Scrutinizer as...

cybersecurity roundup Q

Q1 Roundup: 15 Interesting Articles on Cybersecurity News & Expert Opinions

Things move fast in cybersecurity, and it’s always worth investing time to stay up-to-date on the state of the field. I’ve gathered 15 articles...

scott

WatchGuard NetFlow Configuration

“Does my WatchGuard firewall support NetFlow?” Customers who have WatchGuard firewalls have asked me this question many times over the years. The answer is...