All Security
mikelp

Internet Use Policies: Do Your Employees Even Know What is Acceptable?

I bet you’ve ordered something online at work. It may have been pizza for your lunch or flowers for Mother’s Day (…the day before—hey,...

critical thinking

Asking the Hard Questions: Why Analyze Network Traffic?

There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the...

adamh

Detecting IoT_Reaper with Network Traffic Intelligence

Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of...

jeffm

2017: The Year of Ransomware

In the digital era we live in, almost everyone is aware of malware in one form or another. ‘Malware’ is an umbrella term that...

joanna

Remote Access Trojan Uses DNS to Execute Powershell Commands

Eek! A rat! No, I don’t mean the cute, little rodent with the long tail; I mean the Remote Access Trojan. Trust me, I...

jarryd

Effective Incident Response Starts With Data From Your Network

It seems like every day I talk with network professionals about security and performance, the common theme being speed and ease of use. Having...

Managed Security Service Providers: Network Threat Detection

Managed Security Service Providers are depending on NetFlow and IPFIX as one of the top 3 enablers for improving network threat detection.  The distributed...

Flow Analysis Expert Adam Powers Joins Plixer as Chief Security Officer

Mike Patterson (Plixer CEO and Founder) and I have been long time colleagues in the arena of NetFlow analysis. Over the years we’ve both...