All incident response
jake

Forensic investigation of endpoints using NetFlow

This blog will go over how to use some of the features in Plixer Scrutinizer v19.0, such as the host index and IP groups...

jake

Using your network as a sensor

I spent a lot of time talking to customers at RSA 2019 and a message that resonated with a lot of them was using...

board room

The 5 Steps Every Board of Directors Should Take To Reduce Cybersecurity Risk

Cybersecurity and the Board of Directors are two topics that, historically, have been unrelated; however, they are rapidly becoming highly relevant to each other....

IoT Security Trends & Challenges

Before you read this blog, stop and count every electronic device around you. I’m at my work desk; within a 1-meter radius, I have...

bobn

WannaCry Ransomware – How Scrutinizer Customers Can Reduce Risk

Over the last few days, there has been a whirlwind of global activity surrounding the WannaCry ransomware attack. I wanted to share a short...

jarryd

Effective Incident Response Starts With Data From Your Network

It seems like every day I talk with network professionals about security and performance, the common theme being speed and ease of use. Having...

Detecting DROWN attack

Chances are that unless you are a hermit or have turned yourself into an air-gapped server, you have heard the term “DROWN” kicking around...

Configuring VMware NSX IPFIX

VMware NSX IPFIX provides network monitoring data similar to that provided by physical devices, giving administrators a clear view of virtual network conditions. In...

Responding to zero day threats using NetFlow

In this blog, I want to talk to you about investigating zero-day attacks. A zero-day attack can be a huge menace on the network, since it can bypass a lot...