All

Multi-layered security plan

You already understand the importance of having a multi-layered security plan if you read anything about cybersecurity.  We often talk about it on our blogs, too,...

Network Incident Response System

The network incident response system is a subset of the overall network management effort. Specifically, it addresses the word ‘reactive’ which has plagued the...

Indicator Of Compromise and Detection

Our network admin was made aware of a possible phishing email attack and at the same time reminded of the need for constant internal...

Detecting iPhone Malware

Is your company detecting iPhone malware that is brought into the internal network?  At least 39 iPhone apps found on the Apple Apps Store...

Juniper MX NetFlow Configuration

Juniper MX5 NetFlow Configuration Recently while looking at my router’s NetFlow reporting, I came across an issue regarding the Juniper MX5 router’s NetFlow configuration....

How to Detect DNS Data Breaches

The Domain Name System (DNS) is used to resolve human-readable hostnames like www.plixer.com into machine-readable IP addresses like 67.225.210.22. DNS also provides other information...

Aruba IPFIX Support

After several requests for Aruba NetFlow support dating back to as far as 2012, Aruba IPFIX support is coming soon. We tested their flow...

Data Exfiltration over DNS

How many companies out there are monitoring DNS traffic? Are you concerned about data exfiltration over DNS? How many people even know that is...

Detect Suspicious Network Activity

Security is a top concern for most network administrators and engineers today.  Those that want to detect suspicious network activity within their environment can use...