All Posts

joanna
Network Security

Phishing detection: what not to do and how we help

Phishing attempts have been showing up a lot in the news lately and scammers are getting smarter. What can

Read More
joanna
Security Operations

How to Protect Your Network Against the ‘Sea Turtle’ DNS Hijacking Campaign

A large-scale DNS hijacking campaign called ‘Sea Turtle’ has been spreading across more than 13 countries. With our FlowPro

Read More
joanna
Configuration

Configuring Scrutinizer for LDAP Authentication

Local authentication into software or even hardware is useful for both the end user and the organization as a

Read More
bobn
Security Operations

Three Microsegmentation Challenges Facing NetOps and SecOps

Microsegmention refers to the use of software to secure traffic between virtual machines (VMs) within virtualized data centers. Virtualization

Read More
mikelp
Network Operations

Internet Use Policies: Do Your Employees Even Know What is Acceptable?

I bet you’ve ordered something online at work. It may have been pizza for your lunch or flowers for

Read More
critical thinking
Network Operations

Asking the Hard Questions: Why Analyze Network Traffic?

There are times when we adults would be better off thinking like toddlers. More specifically, I want us all

Read More
adamh
Security Operations

Detecting IoT_Reaper with Network Traffic Intelligence

Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier

Read More
jeffm
Security Operations

2017: The Year of Ransomware

In the digital era we live in, almost everyone is aware of malware in one form or another. ‘Malware’

Read More
joanna
Security Operations

Remote Access Trojan Uses DNS to Execute Powershell Commands

Eek! A rat! No, I don’t mean the cute, little rodent with the long tail; I mean the Remote

Read More
jarryd
Network Operations

Effective Incident Response Starts With Data From Your Network

It seems like every day I talk with network professionals about security and performance, the common theme being speed

Read More