I was having a conversation with a customer the other day about Amazon AWS monitoring. He had some interesting insight on his company’s overall migration to Amazon Web Service (AWS). He started with, “Here’s the core of it, cloud based deployment isn’t going away for us. Though there are no directives, by this time next year I’m expecting all but two of our public-facing applications to be sitting outside of our buildings.” He even went on to say, “There’s a very real possibility that within 2-3 years we decommission half of our computer rooms”. Needless to say, any application that they use for network visibility and incident response needs to support Amazon AWS monitoring. I loved his input and because of it I decided to dig deeper. Continue reading “Amazon: AWS Log Reporting”
A good number of evaluators have been asking me what’s the best way to evaluate our free virtual Netflow collector. There is a growing trend of companies moving away from dedicated hardware to a virtualized environment. However, there are many options to create such a network. Windows has Hyper-V, which is part of the Windows Server OS, VMware has ESXi to, and KVM meet these virtualization needs. Plixer supports all three of these virtual environments with our Free virtual NetFlow collector, Scrutinizer. Installation of our solution is as simple as deploying the appropriate package to the specific hypervisor.
Few years back, I was presenting my three year Information and Cyber Security Program, to my surprise – not all Information Technology (IT) executive understood Information Security (INFOSEC), much more Cyber Security (CYBERSEC). What are the possible relations between these two fields of security?. What is INFOSEC? Let’s find out the definition from widely accepted international […]
While the DNS exploit CVE-2015-7547 was discovered a week ago, the code containing the flaw has been in use since May, 2008. CVE-2015-7547 works by allowing arbitrary code to execute on any system …
Source: The Skinny on CVE-2015-7547
Are you building an incident response system? Does it include tools that allow for attack investigation and recovery? Earlier this year I wrote a three part series on constructing a Cyber Incident Response Plan and outlined two ways Scrutinizer can be an important part of this endeavor. After reading the latest BBC article on how Website-crippling cyber-attacks are to rise in 2016 , I figured that I would talk a bit more on how our Flow Analytic intelligence can assist with attack investigation and recovery.
Every day we see more and more stories about security breaches across the globe. With there being so many new cyber security threats coming out the need for traffic analysis and a strong CyberIncident Response plan has never been so high. In part one and part two of this series, we demonstrated that by combining NetFlow/IPFIX technology with Scrutinizer you are getting 100% network visibility. Here in part three of this series, we are going to talk about the importance of adding Scrutinizers Flow Analytic’s Intelligence into your cyber incident response plan to detect network traffic anomalies.
The value of your cyber incident response plan becomes stronger as various global incidents unfold. Just today, I was going through my news feeds and came across a post titled “Cybersecurity: Defending ‘unpreventable’ cyber attacks” by Paul Rubens from BBC News and one word stood out, “Vigilance”.