All
threat surface

How to reduce your IoT threat surface

Recently, there has been an increase in distributed denial-of-service (DDoS) attacks that involve the use of compromised IoT devices like IP cameras, and it...

network analytics

Network Analytics: What It Is, How It’s Used, and Who Benefits the Most

Simply put, network analytics is the practice of using different types of network data to identify trends and patterns. Then, that information is used...

annam

How to Enable Cisco TrustSec NetFlow

As I was visiting customers onsite last week, a few of them asked me if we support Cisco TrustSec NetFlow exports. Of course, we...

scottr

Palo Alto Networks: NetFlow Reporting and Username Correlation

A few years ago, I wrote a blog that talked about how our Palo Alto NetFlow reporting allows network administrators to easily identify traffic...

adam

How to Gain Visibility into CGNAT

In today’s world of connected refrigerators, thermostats, cars, and phones, IP addresses are in high demand. IPv6 was invented to solve this problem, but...

mikelp

4 Tips on How to Set Up Scrutinizer for Maximum Efficiency

When supporting a product, you often hear patterns across the support cases you take. Today, I wanted to give you a short list of...

facebook like button

Protecting your organization from social media breaches

In a recent data breach, Facebook said hackers gained access to nearly 50 million accounts in what amounts to the largest-ever security breach at...

Protecting customer data after bankruptcy

On Protecting Customer Data: What Happens After Bankruptcy?

In my experience, most conversations on how to protect customer data revolve around active companies. Certainly important, but what about bankrupt companies? That data...

jimd

Three Strategies to Catch and Stop Insider Threats

Earlier this year I worked on a document that addressed some of the common misconceptions about Scrutinizer. One of the subjects that caught my...