All Posts

A magnifying glass reveals a fingerprint on a digital surface, representing Indicators of Compromise
Network Security

What Are Indicators of Compromise? A 2025 Guide for Cybersecurity Teams

For security teams, early detection is the difference between a minor incident and a full-scale breach. That’s where Indicators

Read More
elgin
Network Operations

Support criteria for SD-WAN vendors

As OEMs continue to invest in WAN optimization, what differentiates vendors’ capabilities so that enterprises seek to scale their

Read More
Security Operations

Dark DDoS: Masked Data Exfiltration

I was attending the 12th annual NC InfoSeCon conference back in October and in one of the presentations, the

Read More
Network Operations

Indicator Of Compromise and Detection

Our network admin was made aware of a possible phishing email attack and at the same time reminded of

Read More
Security Operations

Security Professionals Love NetFlow and IPFIX

It has never been more dangerous to maintain your company’s on-line presence.  If your company security perimeter is breached,

Read More
Security Operations

Cisco ASA Internet Threat Defense Solution Webcast

In our February 14th webcast, we will present how the Cisco ASA NSEL exports are used to detect network

Read More
Security Operations

Internet Threat Defense Solution: Part 1

Building organization confidence surrounding a company’s Internet threat defense effort means we can never let our guard down.  A

Read More
Network Operations

How to avoid IPFIX or NetFlow Sampling Vs. sFlow

Sampling traffic in an effort to represent the overall traffic pattern in theory is a sound idea.  In fact,

Read More