All

How to monitor Intel AMT traffic

With the recent news of security vulnerabilities in the Intel Active Management Technology, now seemed to be the best time to share how security...

briand

How to Integrate Grafana with NetFlow

UPDATE: A new version of documentation is available here. This week I have had a few customers ask how to integrate Grafana with NetFlow...

adam

Identify Screen Sharing Network Traffic

Screen sharing applications have changed the landscape of the modern office. These tools allow users to remotely control another PC and receive image data...

jimd

Net Neutrality: How Service Providers’ Peering Changes Could Impact Your Business

Net neutrality has been a big player in the business and technology news for the past few weeks. It’s clearly a controversial subject. From...

Correlating NetFlow with RADIUS Usernames

Correlating NetFlow with RADIUS Usernames to improve context security awareness is something we have done for several vendors including Cisco ISE, Microsoft Network Policy...

network topology

Creating a Network Map

Network Maps provide end-users with a high-level view of what their network topology looks like, as well as how traffic is flowing through your...

board room

The 5 Steps Every Board of Directors Should Take To Reduce Cybersecurity Risk

Cybersecurity and the Board of Directors are two topics that, historically, have been unrelated; however, they are rapidly becoming highly relevant to each other....

traci

IoT Security: The Nightmare After Christmas

What’s this? What’s this? There’s IoT devices everywhere!...

critical thinking

Asking the Hard Questions: Why Analyze Network Traffic?

There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the...