All

VMware NSX IPFIX Exports

With the growing number of vendors supporting Flow based technologies, we’re seeing a rise in use cases and possibilities for flow analysis and performance...

Cryptolocker Detection On Your Network

It lurks on the internet, it hungers for personal information, it waits until you download that seemingly innocent file… it’s Cryptolocker....

Flow Replicator Vs UDP Forwarder

Recently a customer called in asking about our UDP Forwarder.  At first I wasn’t sure what they were talking about but, as they explained...

Monitoring the Internet of Things

The “Internet of Things” is a buzz phrase that has been thrown around a lot in the last few years. With more and more devices...

Visibility into Encrypted Traffic

Last month, we presented a webcast on Visibility into Encrypted Traffic. In the webcast, we explain how TLS inspection and SSL/TLS DPI work. In this...

Does the FBI iPhone Hack Fall Under Ethical Hacking?

The Federal Bureau of Investigation recently cracked a locked iPhone in order to procure evidence against one of the San Bernardino shooters.  Now, the...

Verizon DBIR Hidden Message: cyber.pathogen.ai

Verizon recently released the 2016 Verizon Data Breach Investigations Report. The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides an analysis of...

Detecting DROWN attack

Chances are that unless you are a hermit or have turned yourself into an air-gapped server, you have heard the term “DROWN” kicking around...

NetFlow Security Analytics

NetFlow Security Analytics Detecting threats and intrusions on your network is an ongoing, evolving process/battle. Keeping up with NetFlow Security Analytics is something we strive...