All network security
jake

Best Practices in Network Forensics

When shopping for tools to help with network forensics, you will find many vendors claiming why they are the best, but not necessarily how...

jeff

Network Behavior Analysis and User Behavior

As flow data becomes a growing asset for security analysts, a question arises: “Can I get more context and how do I best leverage...

jarryd

IoT Security with NetFlow/IPFIX

With billions of devices coming online yearly, the world of IoT (Internet of Things) is upon us. Unfortunately, like any new technology, form and...

brandon

Stormshield IPFIX Support in Scrutinizer

In a “Bring-Your-Own-Everything” world, it has become even more of a challenge keeping users in check while developing an agile corporation that moves with...

jarryd

Malware-Infested Phones on Your Network

With cellular networks taking over the world and nearly every person joining team Apple or Android, it’s easy to see why the evildoers of...

Radius Authentication in Scrutinizer

When it comes to network security there are dozens of factors that we always need to consider. Can we block malicious traffic? Are we...

Context-aware security

According to Gartner, when it comes to context-aware security, the most commonly cited context types are location and time. However, there are multiple types...

Multi-layered security plan

You already understand the importance of having a multi-layered security plan if you read anything about cybersecurity.  We often talk about it on our blogs, too,...

Data Exfiltration over DNS

How many companies out there are monitoring DNS traffic? Are you concerned about data exfiltration over DNS? How many people even know that is...

Arista sFlow Configuration

Lately I’ve spoken to a few people in the field that are using Arista switches to get visibility into their networks using sFlow and...