All
Hourglass

How to Maintain a Secure Small Business Network (Even When You Work Alone)

Cybersecurity is never easy, but maintaining a secure small business network is arguably even harder because the IT team has much fewer staff. Even...

jake

Best Practices in Network Forensics

When shopping for tools to help with network forensics, you will find many vendors claiming why they are the best, but not necessarily how...

briand

How to Integrate Grafana with NetFlow (Part 2)

UPDATE: A new version of documentation is available here and an updated blog is available here. This week I have had a few customers...

annam

How to Monitor CLDAP Traffic with NetFlow

Earlier today, the newest Distributed Denial of Service attack vectors, such as memcached and CLDAP, came up during a customer’s training session. It sparked...

bobn

Three Microsegmentation Challenges Facing NetOps and SecOps

Microsegmention refers to the use of software to secure traffic between virtual machines (VMs) within virtualized data centers. Virtualization has increased organizations’ agility and...

scott

Cisco Catalyst 9300 NetFlow Configuration

One device that I am beginning to see a lot more of at my customer sites is the Cisco Catalyst 9300. I figured that...

adam

What is Distributed Reflection Denial of Service?

In the wake of recent vulnerabilities with memcached, Distributed Reflection Denial of Service (DRDoS) is currently in the focus of public attention. Using this...

unicode domain phishing attacks

Unicode Domain Phishing Attacks: Can You Spot the Difference?

To detect a phishing scam, we typically examine hyperlinks for odd domains or subtle character changes (like a “1” in place of an “I”)....

critical infrastructure

Protecting Critical Infrastructure from Cyberattacks with Network Traffic Analytics

According to a recent New York Times’ article, there have been cyberattacks on critical infrastructure Saudia Arabia recently. While these attacks were not elaborated...