All

Flow Directionality Support : Part 1

When the security team identifies a suspicious activity, they often turn to NetFlow or IPFIX first to gain insight into how the bad actor...

vSphere Configure Netflow

Today we are going to take a look at how to configure NetFlow so that you can gain visibility into your vSphere virtual distributed...

Security Vendors Teaching Bad Actors How to Get Past Firewalls

It’s hard to believe, isn’t it? Our security vendors (e.g. McAfee, SonicWALL and others) are using the same tactics as malware to extract information...

Cyber Incident Response Plan (Part 2)

In my previous blog, I talked about the value of having a cyber incident response plan.  An important factor in a plan like this is having...

Overview of DNS Protocol : Part 3 of 3

Make sure you read Part 1 of Overview of DNS Protocol before reading this one or you can go back to part 2. At...

NetFlow Security Monitoring

NetFlow Security Monitoring When you hear NetFlow/IPFIX, what is your first thought? For most people, their first thought will be “NetFlow’s great for performance...

Overview of DNS Protocol : Part 2 of 3

This is part 2 of our 3 part series which provides an overview of the DNS protocol.  Below are a few other terms you may have...

Overview of DNS Protocol : Part 1 of 3

If you have ever wondered how the DNS works, this post was put together by three of us plixer dudes who wanted a DNS...

Uncovering Data Exfiltration | Electronic Data Theft

Bengway Industries is a 30 year old, 400 million dollar manufacturing company located in Western Europe. The company has 3 primary locations, each with...