All Security Operations
stephen

Network Detection and Response (NDR): What does it mean?

What is NDR? This blog will focus on the hottest 3-letter acronym of 2020 & 2021—NDR. Network Detection and Response solutions must address an...

Why and how to export a violator list for DDoS mitigation

The need to detect and mitigate denial-of-service attacks is nothing new to network and security administrators. DoS attacks on enterprise networks have been occurring...

dylan

Should you be monitoring ping?

Ping is one of those protocols that no one thinks about until it isn’t working and you’re trying to quickly troubleshoot connectivity between devices....

jim

The harsh truth about the next cyberattack

I don’t know about you, but it seems like there’s news of some big data breach every other month. The hard truth is that...

joanna

5 ways of verifying security risks and avoiding false positives

I think I can safely assume that everyone knows the cautionary tale of the boy who cried wolf. If you don’t, the moral is...

elgin

How human negligence affects network security

As enterprises adjust to the new normal and remote work, they are bracing for potential attacks resulting from employee carelessness. Bad habits, such as...

joanna

Five ways Plixer Scrutinizer helps retail networks

Even though most of us have looked at a calendar recently and thought, “I could have sworn we were in May, not October,” you...

briand

Username reporting: NetFlow integration with Splunk

I was recently able to explore the Splunk software development kit with a customer. This helped me to implement another way to get username...

scottr

How to detect suspicious ICMP traffic

A few years ago, we added a behavioral algorithm to Plixer Scrutinizer that looked at all the flow data that was collected and determined...