The number of breaches impacting corporate networks has reached epidemic proportions. This year is currently on track to break all records for breaches. Already this year there have been 1,900 reported breaches in just the past three months, according to Risk Based Security.
Network performance monitoring (NPM) involves tools and practices that allow enterprises to observe and manage their network’s performance levels. It is a subset of network management that discovers performance anomalies and alerts your team to their presence. Some NPM tools can also diagnose performance issues or administer automated fixes when it discovers a problem. If you’re unfamiliar with network monitoring, however, you need to find the proper place to find information about it. There are plenty of resources available, such as our network monitoring site, to help you learn about network monitoring and its advantages. One such resource is YouTube, which has no shortage of videos that aim to teach viewers about how network monitoring works.
I had a chance to sit down and talk to Plixer during the 2019 RSA Conference. Thomas Pore, VP of Technical Services, gave me a great overview of what they can do for network and security visibility. Plixer uses information gathered from NetFlow and IPFIX to build a picture of the traffic behavior in the network and give information about what’s going on. He showed me some of the ways that Plixer is leveraging the network to give the information that security professionals need to find things like lateral movement and for post-event forensics.
When NetOps and SecOps are joined, they can discover important insights that lead to smarter decisions enabling a more secure and efficient organization.
In this podcast recorded just before CiscoLive 2019, CEO Jeff Lindholm outlines a refreshed vision for Plixer, a company Cisco users have turned to for many years for a deeper data insight into their networks in connection with understanding security risks.
Who’s on your network? What’s on your network? These questions never change, but the ways we get to meaningful answers are always evolving. Providers of network visibility solutions are constantly upgrading their capabilities to detect threats and enable rapid, effective responses to network security incidents.
Choosing a virtual private network (VPN) can be difficult. Besides selecting a VPN provider, users must also choose between a paid VPN or a free VPN, among other factors. Simply picking a seemingly “free” VPN can have consequences ranging from having information logged and sold to advertisers, which may defeat the purpose of using a VPN in the first place, to having the VPN used as a portal to deliver malware to your device.
VPNs are the primary tool for securing remote access, but recently disclosed vulnerabilities point out the weakness of relying on them as the only tool.
It has been reported that the U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued a joint malware analysis report (MAR) on a new Trojan dubbed HOPLIGHT, used by the North-Korean APT group Lazarus. According to the MAR AR19-100A advisory published on the US-CERT website, the new Trojan was detected while tracking the malicious cyber activity of the North Korean-backed hacking group HIDDEN COBRA (also known as Lazarus, Guardians of Peace, ZINC, and NICKEL ACADEMY).
Hackers have been breaking into home routers to change DNS server settings and hijack the traffic to redirect it to malicious sites, according to Troy Mursch, security researcher for Bad Packets.