Looking East and West
NetFlow can provide an efficient way of monitoring traffic moving laterally across a network.
NetFlow can provide an efficient way of monitoring traffic moving laterally across a network.
The systematic problems the Mandiant APT1 report revealed in enterprise surveillance efforts.
How the importance of physical surveillance throughout human history teaches us why we are failing at network security and how we can fix it.
What SQL Injection is and how intelligent monitoring of NetFlow can detect and deter it.
Using NetFlow to determine if network resources are being sold on the black market.
We are taking a retarded amount of time to discover unknown (zero day) threats and how we can reduce that window.
The last installment explains the importance of knowing what to do when a breach is detected.
Not all types of cyber attacks are the same. In this third installment we look at different exploit types and their delivered payloads.