All
context

Network Traffic Analytics with Gigamon

Quite some time ago, my colleague wrote about our Gigamon NetFlow support. That article will help you understand how to configure your Gigamon appliances...

How to detect SSH credential misuse with network traffic analytics

According to a recent article on BleepingComputer, a backdoor Python library can steal SSH credentials. This can lead to ssh credential misuse if undetected by IT...

insider threats employees

How to Mitigate Insider Threats with Network Traffic Analytics

According to a recent Ponemon Institute report, the cost of insider-related breaches has escalated to over $8.7 million. What’s even more concerning is that...

critical infrastructure

Protecting Critical Infrastructure from Cyberattacks with Network Traffic Analytics

According to a recent New York Times’ article, there have been cyberattacks on critical infrastructure Saudia Arabia recently. While these attacks were not elaborated...

How to monitor Intel AMT traffic

With the recent news of security vulnerabilities in the Intel Active Management Technology, now seemed to be the best time to share how security...