All

Cyberoam NetFlow Configuration

One of the cool things about my position as a Solution Engineer, is that I often work with customers who show me NetFlow configuration...

Phishing Attack Training

01 October 2017: Click Click Phish is no longer available. Last week we released a phishing attack training game called Click Click Phish after being inspired...

Network Forensic Analysis

When an incident or threat occurs on our networks today one of the more plaguing questions that comes up is “How can I leverage...

How to deploy a Flowpro Virtual Appliance

Today I want to talk about how to deploy a Flowpro Virtual Appliance. With the Flowpro Virtual Appliance, you can get that visibility into...

Protect Against Cyber-Attacks

According to a recently released report by Standard and Poor, lenders could have their credit rating lowered if they fail to protect themselves from...

How to Shop Online Safely

In just a few short weeks, Black Friday and Cyber Monday will usher in a mad rush of holiday shopping.  I’m happy to see...

Incident Response to C2 Domain results in Disabling Google Chrome Prefetch

I got a call the other day that lead to a fast incident response relating to a C2 domain communication.  I thought I would...

DNS Hijacking Attack

Recently one of our employees experienced a DNS hijacking attack while trying to visit a company’s website to learn more about them. You have...

Investigating Targeted Attacks

You received a call about an IP address behaving strangely and now you need to investigate the issue and start collecting details surrounding the...