Gartner Video on Network Behavioral Analysis
Video presentation from Lawrence Orans of Gartner, describing how Network Behavioral Analysis (NBA/NBAD) can detect advanced, targeted threats.
Sign up for F15hb0wn.com blog updates
Video presentation from Lawrence Orans of Gartner, describing how Network Behavioral Analysis (NBA/NBAD) can detect advanced, targeted threats.
The last installment of drawing lessons from the Shoe Bombing attack in Network Security is focusing on the actions and response following threat detection.
One thing we learned from the Shoe Bomber, Richard Reid is that not all attackers are the same. In this installment we examine the differences in cyber attackers.
Applying the lessons on surveillance we learned from physical security in stopping the Shoe Bomber to network and informaiton security.
In the second installment of this Network Security 101 series, the differences between attack payloads are examined.
Comparing how physical security caught the shoe bomber to how we go about catching network threats.
Behavioral analysis of NetFlow can alert to policy violations as well as suspicious and anomalous activity concerning protected data such as card holder (PCI), patient records (HIPAA) as well as PII and trade secrets.
Download the deck from SANS DFIR Summit 2013 on "Hunting Attackers with Network Audit Trails." Tom Cross & I delivered this in Austin, TX.
The quest for the (non-existent) Holy Grail of InfoSec: the "single pane of glass." Discussion on why we want it, what it will take to get it and what to do in the interim.
How intelligent NetFlow analysis can ease the pain associated with adding networks gained from mergers and acquistions.