All

NIKE Customer Service

Two years ago I was getting a bit over weight. Everything else was great. I have a great career, I loving relationship with my wife...

IP Address Reputation – How to Discover Malware

Many types of malware can be uncovered simply by cross referencing the internet hosts your internal users are connecting to with an IP address...

Incident Response Pocket Guide

Becoming a NetFlow private eye is easy if you’re using the right Incident Response System (IRS). Our team is lucky to be able to experience...

Integrating NetFlow and SIEMs: Enterprise incident response solutions

If you’re an avid follower of our blogs, then you know that network threat detection using NetFlow analytics is a valuable enhancement to network...

F5 IPFIX Configuration: IPFIX logging for SIP DoS

At the beginning of the year Dale wrote a blog on F5 Networks IPFIX Support. Today, I want to follow up on that post...

Cisco NGA Configuration Guide

Last week I was working with a customer who needed help with a Cisco NGA Configuration (NetFlow Generation Appliance).  The customer was running the...

Malware Incident Response System

Whether your company has 50 employees or 50,000, someone somewhere in the next 60 days will bring malware into your network. When it happens,...

Ixia Network Application and Threat Intelligence using IPFIX

Last week Ixia announced the integration of their Application and Threat Intelligence Processor and our cyber threat incident response solution.  Using IPFIX, or what...

Network Security: Detecting Malicious Traffic with NetFlow

Today, I want to discuss how you can use NetFlow for detecting malicious traffic on your network. With all of the recent malware outbreaks...