Inspecting encrypted traffic with JA3 and JA3S fingerprinting
Two years ago, I wrote a blog about tracking malware in encrypted traffic. The overall theme of that blog
Read MoreInsights, updates, and technical deep dives from our team
Two years ago, I wrote a blog about tracking malware in encrypted traffic. The overall theme of that blog
Read More
One of the perks of working in technical support is learning something new every day. For instance, just earlier
Read More
If this ever changin’ world in which we live in makes you give in and cry say I’m only
Read More
Whether you work primarily on the networking side of the house or the security side, you’ll need to ingest
Read More
Over the years, libraries have been filled on the topic of flow protocols—specifically, how they work and their general
Read More
I spend a large amount of time day-to-day working with customers to understand how they can best leverage their
Read More
Recently I’ve had many requests from customers who upgraded to the Catalyst 9500 series and are looking for a
Read More
Let’s talk about the cloud for a minute. A majority of IT infrastructure has been moving to the cloud
Read More
We’ve seen a lot of coverage regarding the growth of Extreme Networks lately. Between their recent acquisition of Brocade
Read More
Scrutinizer from Plixer is the recognized leader in metadata and NetFlow analysis and it just got even better! With
Read More