All

SIEM Market Misrepresenting Their Security Value

If you think that your company’s SIEM is a reasonably good solution for detecting intrusions, your probably less safe than you think. SIEMs rely...

Exchange Monitoring Tool

My colleague Jake recently wrote about Disaster Recovery Monitoring, and about how our Incident Response System, using IPFIX/NetFlow is more helpful then tools that...

Flow Directionality Support : Part 1

When the security team identifies a suspicious activity, they often turn to NetFlow or IPFIX first to gain insight into how the bad actor...

vSphere Configure Netflow

Today we are going to take a look at how to configure NetFlow so that you can gain visibility into your vSphere virtual distributed...

Security Vendors Teaching Bad Actors How to Get Past Firewalls

It’s hard to believe, isn’t it? Our security vendors (e.g. McAfee, SonicWALL and others) are using the same tactics as malware to extract information...

Cyber Incident Response Plan (Part 2)

In my previous blog, I talked about the value of having a cyber incident response plan.  An important factor in a plan like this is having...

Overview of DNS Protocol : Part 3 of 3

Make sure you read Part 1 of Overview of DNS Protocol before reading this one or you can go back to part 2. At...

NetFlow Security Monitoring

NetFlow Security Monitoring When you hear NetFlow/IPFIX, what is your first thought? For most people, their first thought will be “NetFlow’s great for performance...

Overview of DNS Protocol : Part 2 of 3

This is part 2 of our 3 part series which provides an overview of the DNS protocol.  Below are a few other terms you may have...