With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.
A phishing campaign targeting utility grid operators uses a PDF attachment to deliver spyware.
Solutions Review have compiled a list of the best 32 network monitoring tools. These solutions include both software and hardware that help IT teams monitor and manage their network performance. We’ve listed the major features of each solution and the approach they bring to network performance monitoring and management. These tools should definitely be considered by any enterprise looking for a solution to improve or manage the performance of their network infrastructure.
Earlier this week, Capital One became the latest financial institution to fall victim to a data breach as it was discovered that a hacker illicitly gained access to data on 100 million customers. The data reportedly consisted of consumer and small business credit card applications filed between 2005 and 2019 and included applicants’ names, addresses, phone numbers, dates of birth, and other sensitive information. About 140,000 Social Security numbers and 80,000 bank account numbers were also accessed, although the bank said no credit card numbers or log-in credentials were compromised.
At least 62 colleges were affected by a software vulnerability in a program called Banner, operated by Ellucian, that allows threat actors to infiltrate colleges’ private records.
The incidents of Mirai malware with 60 known variants targeting the enterprise through IoT devices, has more than doubled between the first quarter of 2018 through the first quarter of 2019 according to IBM X-Force researchers.
D-Link agreed to make several security enhancements that overhaul the firm’s security platform to settle a Federal Trade Commission (FTC) litigation case concerning allegations that the company misrepresented the security of its products.
The number of breaches impacting corporate networks has reached epidemic proportions. This year is currently on track to break all records for breaches. Already this year there have been 1,900 reported breaches in just the past three months, according to Risk Based Security.
Network performance monitoring (NPM) involves tools and practices that allow enterprises to observe and manage their network’s performance levels. It is a subset of network management that discovers performance anomalies and alerts your team to their presence. Some NPM tools can also diagnose performance issues or administer automated fixes when it discovers a problem. If you’re unfamiliar with network monitoring, however, you need to find the proper place to find information about it. There are plenty of resources available, such as our network monitoring site, to help you learn about network monitoring and its advantages. One such resource is YouTube, which has no shortage of videos that aim to teach viewers about how network monitoring works.
I had a chance to sit down and talk to Plixer during the 2019 RSA Conference. Thomas Pore, VP of Technical Services, gave me a great overview of what they can do for network and security visibility. Plixer uses information gathered from NetFlow and IPFIX to build a picture of the traffic behavior in the network and give information about what’s going on. He showed me some of the ways that Plixer is leveraging the network to give the information that security professionals need to find things like lateral movement and for post-event forensics.