All
everythings okay

This WannaCry Phishing Email is an Empty Threat

One of last year’s biggest threats is rearing its ugly head again in the form of a WannaCry phishing email scam. Early on June...

jake

Best Practices in Network Forensics, Part II: Insider Threats

In part 1 of our Best Practices in Network Forensics we discussed different integrations and how you can tie in your existing tools with...

briand

Username Reporting – NetFlow Integration with ForeScout CounterACT

User attribution is one of the things I’m asked for most frequently by customers who are looking at network traffic analytics. The use case...

annam

How to Monitor Lateral Movement with NetFlow

During our incident response training conducted all over the world, we work with security professionals to identify various trends related to how malicious actors...

scottr

Username Reporting – NetFlow Integration with Cisco ISE

Traditionally in networking, we track down end systems by searching on IP addresses. Although this is a great way to narrow in on an...

GDPR phishing scams

Watch Out for GDPR Phishing Scams

The EU’s General Data Protection Regulation (GDPR) goes into effect starting today. Even if you don’t follow news related to data privacy, you’ve probably...

adam

Integrating Threat Intelligence with Flow Data

Threat intelligence feeds help us keep our networks secure and our engineers informed on the latest issues. Huge volumes of this data get published...

jimd

More on Endpoint Visibility: Mobile Security and Your Network Security Strategy

Why should your endpoints be an important part of your network security strategy? Because even though they are out in the wild, endpoints are...

How to detect SSH credential misuse with network traffic analytics

According to a recent article on BleepingComputer, a backdoor Python library can steal SSH credentials. This can lead to ssh credential misuse if undetected by IT...