All

Moloch Packet Capture Integration

Ever look at the NetFlow details of a conversation and wish you had the full packets to look at?  Combining your NetFlow solution with...

Understanding Xmas Scans

‘Twas the night before Christmas and all through supportPhone queues were empty, no issues to thwart.The servers we racked in the center with careIn...

ZyXEL sFlow Configuration

Today we’ll focus on  ZyXEL sFlow Configuration, in order for the switch to monitor traffic and export sFlow to a collector for analysis. Supporting our international...

VTech Breach, Hacking Barbies, and Internet of Things Security

Late last month on Black Friday, Hong Kong-based toymaker VTech suffered a data breach.  Sure, we can just dump it into the ever-expanding list...

Host Reputation and Domain Reputation

It’s becoming more and more evident that an effective cyber threat incident response system requires the implementation and fine tuning of a variety of...

Detecting Point of Sale Credit Card Theft

The complexities involved with detecting Point of Sale credit card theft has to consider numerous tactics. It also requires an understanding that the behavior...

Cisco Network Visibility Flow Protocol (nvzFlow) Support

Last month Cisco announced “Deeper visibility and control over endpoints and network access” via AnyConnect 4.2.  It does this by using the new Cisco Network Visibility Flow...

NetFlow SaaS Offering

Finally, a secure NetFlow SaaS offering that is rich with analytics features while being highly scalable for distributed networks.  Although our system was easily...

Internet Threats: UDP Scans

Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers of Internet Threat Defense is...