All
briand

How to Integrate Grafana with NetFlow (Part 2)

UPDATE: A new version of documentation is available here and an updated blog is available here. This week I have had a few customers...

annam

How to Monitor CLDAP Traffic with NetFlow

Earlier today, the newest Distributed Denial of Service attack vectors, such as memcached and CLDAP, came up during a customer’s training session. It sparked...

bobn

Three Microsegmentation Challenges Facing NetOps and SecOps

Microsegmention refers to the use of software to secure traffic between virtual machines (VMs) within virtualized data centers. Virtualization has increased organizations’ agility and...

scott

Cisco Catalyst 9300 NetFlow Configuration

One device that I am beginning to see a lot more of at my customer sites is the Cisco Catalyst 9300. I figured that...

adam

What is Distributed Reflection Denial of Service?

In the wake of recent vulnerabilities with memcached, Distributed Reflection Denial of Service (DRDoS) is currently in the focus of public attention. Using this...

unicode domain phishing attacks

Unicode Domain Phishing Attacks: Can You Spot the Difference?

To detect a phishing scam, we typically examine hyperlinks for odd domains or subtle character changes (like a “1” in place of an “I”)....

critical infrastructure

Protecting Critical Infrastructure from Cyberattacks with Network Traffic Analytics

According to a recent New York Times’ article, there have been cyberattacks on critical infrastructure Saudia Arabia recently. While these attacks were not elaborated...

jeff

Wildcard Mask Filters Within Scrutinizer

While working with users, I’ve noticed scenarios where filtering traffic based on a CIDR or an IP range just isn’t enough control. I wanted...

traci

Extreme NetFlow Configuration for S-Series, N-Series, and K-Series

We’ve seen a lot of coverage regarding the growth of Extreme Networks lately. Between their recent acquisition of Brocade and Avaya, it would appear...