Internet Use Policies: Do Your Employees Even Know What is Acceptable?
I bet you’ve ordered something online at work. It may have been pizza for your lunch or flowers for Mother’s Day (…the day before—hey,...
I bet you’ve ordered something online at work. It may have been pizza for your lunch or flowers for Mother’s Day (…the day before—hey,...
There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the...
Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of...
In the digital era we live in, almost everyone is aware of malware in one form or another. ‘Malware’ is an umbrella term that...
Eek! A rat! No, I don’t mean the cute, little rodent with the long tail; I mean the Remote Access Trojan. Trust me, I...
It seems like every day I talk with network professionals about security and performance, the common theme being speed and ease of use. Having...
Managed Security Service Providers are depending on NetFlow and IPFIX as one of the top 3 enablers for improving network threat detection. The distributed...
Mike Patterson (Plixer CEO and Founder) and I have been long time colleagues in the arena of NetFlow analysis. Over the years we’ve both...
Looking for documentation? Visit our documentation site