All

Student Retention and Enhancing the Learning Experience

I was recently given the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim California as part of the Plixer team.  For those...

Dark DDoS: Masked Data Exfiltration

I was attending the 12th annual NC InfoSeCon conference back in October and in one of the presentations, the speaker mentioned Dark DDoS attacks....

dns fi

How to prevent DNS leaks

Many are concerned about how data may leave their network connected devices via data theft (or data exfiltration). As such, many users will connect...

trojan horse

DressCode Trojan – How To Find Botnets

I was recently speaking with a customer about network security when he brought up a nasty botnet called the DressCode Trojan. Having never heard of...

Amazon Hacked or False Accusation

Given the size of Amazon’s customer base, it is probably one of the largest Internet sites targeted by hackers. As of 2014, the company...

10 Bad Password Habits and Why We Do Them Anyway

Bad password habits are far more common than we’d like to admit. Last year, for instance, I bought a used electronic device. But to my...

Detecting DDoS Booters with NetFlow

DDoS (Distributed Denial of Service) attacks are becoming more and more common as more bad actors roam the internet. Recently, a major DDoS attack...

Catching Mr Robot with Netflow

If you are into cyber security and reading this blog then there is a good chance you have heard of USA Network’s hit show, Mr...

Amazon: AWS Log Reporting

I was having a conversation with a customer the other day about Amazon AWS monitoring.  He had some interesting insight on his company’s overall...