When exploring how digital advertising affects users on a daily basis, you may wonder what solutions are in place to monitor complex systems in real time. Think of searching for the latest Apple iPhone: it only takes this one search and then you’ll get iPhone ads in your email and in between your daily search for other items. This is called adtech and it focuses on a targeted demographic or subject through direct advertising. This blog explores adtech, but first we need to understand how the adtech ecosystem works.Read more
We all know that VPN monitoring is something every network and security engineer should be familiar with, but with the recent uptick of changes in companies work-from-home policies, IT departments are struggling to scale up to the VPN demands. Let’s be 100% honest about this: most networks weren’t designed to handle the demand we are seeing right now.
When speaking with customers about what they need to support their infrastructure, the thing we hear most is “network performance monitoring.” This blog will share my insight on what is network performance monitoring, tools utilized, and methods to use Scrutinizer for monitoring network performance.Read more
More and more people are working from home. Now, organizations need a way to understand the role a remote workforce plays in their network performance and security posture. Fortunately, with network traffic metadata, organizations can easily monitor VPN traffic, whether it’s through a split tunnel or no-split tunnel.Read more
RSA 2020 was last week and like every year I have attended, there was a whirlwind of new technologies and methodologies being presented by the vendors I spoke with. Continue on to see what things we learned and how Plixer can help solve problems facing today’s customers.Read more
The big boss had a conference call over the weekend. She sent a message to your boss’s boss, which trickled downhill, and eventually made its way to you in the form of a text message.Read more
Lately, I have seen an increase in support calls regarding the increase in bandwidth consumption and the degradation of application performance seen when employees started working from home because of the coronavirus outbreak.Read more
Where do I start?
We all end up asking ourselves this question as we dive into a new platform and a sea of new processes. Whether your job requires you to seek out issues within the network or hunt for anomalies and threats, having some guidance goes a long way. Plixer’s Scrutinizer platform uses flow and metadata analysis to provide rich context with automatic template recognition, which means little to no upfront configuration. However, I still believe it’s crucial to know where to start because data can be daunting, even when it’s your own. I’ve had a few opportunities to ride shotgun on threat hunting and network slowdown events and in my experience, these reports will allow anyone to bubble up the right issues using Scrutinizer.Read more
Last month the FBI posted ALERT AC-000113-TT, which mentions an increase in unidentified cyber actors exploiting a known SharePoint vulnerability to gain access to unprotected networks. The CVE-2019-1491 vulnerability was found late last year and Microsoft posted an out-of-band patch soon after. The FBI soon raised the alert after it received reports that multiple municipalities here in the states had been compromised.Read more
Ryuk ransomware was discovered in August of 2018. Since then, over 100 US organizations have been affected. Knowing more about how Ryuk ransomware operates can help us to better protect our network.Read more