All Posts

Security Operations

Internet Threats: UDP Scans

Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers

Read More
Network Operations

Malware Incident Response System

Whether your company has 50 employees or 50,000, someone somewhere in the next 60 days will bring malware into

Read More
Security Operations

Security Professionals Love NetFlow and IPFIX

It has never been more dangerous to maintain your company’s on-line presence.  If your company security perimeter is breached,

Read More
Network Operations

Detecting Network Threats

Do you have a solution in place for detecting network threats?  If you say no, you are not alone. 

Read More
Security Operations

Banking Internet Security

Now more than ever banking Internet security is at the forefront of nearly every CIO, CTO and Director of

Read More
Network Operations

Cisco NetFlow | Part 2 – What is Flow Analytics™?

In this blog, I will be continuing Part 1 of the “What is Flow Analytics™?” Series. In this blog I

Read More
Network Operations

Username NetFlow Reporting

Username NetFlow Reporting is a hot topic since the Cisco Visual Networking Index (VNI) report in late May. By 2016,

Read More
Network Operations

Calculating NetFlow Volume

Often these days, we’re asked for a general rule of thumb or guidelines that can help with calculating NetFlow

Read More
Network Operations

12 Vulnerabilities is the Average for a given PC : Detect Network Threats

I came across this article in infosecisland.com on Securing PCs posted by Michelle Drolet who is the founder and

Read More
Security Operations

Identity-Aware NetFlow: Cisco ASA NSEL

Businesses with IT Teams managing tens of thousands of IP addresses often find it more difficult to track down

Read More