A good number of evaluators have been asking me what’s the best way to evaluate our free virtual Netflow collector. There is a growing trend of companies moving away from dedicated hardware to a virtualized environment. However, there are many options to create such a network. Windows has Hyper-V, which is part of the Windows Server OS, VMware has ESXi to, and KVM meet these virtualization needs. Plixer supports all three of these virtual environments with our Free virtual NetFlow collector, Scrutinizer. Installation of our solution is as simple as deploying the appropriate package to the specific hypervisor.
Continue reading “Free Virtual NetFlow Collector”
Few years back, I was presenting my three year Information and Cyber Security Program, to my surprise – not all Information Technology (IT) executive understood Information Security (INFOSEC), much more Cyber Security (CYBERSEC). What are the possible relations between these two fields of security?. What is INFOSEC? Let’s find out the definition from widely accepted international […]
via What’s the difference between Information Security and Cyber Security? — Daniel Vizcayno’s Insights
Wow, this brings me back. I only played a small part in this production, but boy was it fun. Most of the credit goes to the one and only Mix Master Mitch.
Back then Plixer was a small company over in Sanford, Maine. I mean, we were so close back then, nearly the entire team would play basketball in the parking lot after work. Good times. Even though it’s a much larger company now, Plixer still stays true to its razor sharp focus on flow technology.
I know, it sounds sales’e but it’s the truth.
I was watching “How to Magically Connect with Anyone by Brian Miller | TEDxManchesterHighSchool” and was enlightened. As a magician, he has mastered the art of understanding different perspectives in order to create illusions and connect with the audience. In the talk Brian explains how he used that skill to create magic for a blind man. Continue reading “Sales Engineer 101: Back to Basics”
A new government backed initiative to encourage young people into careers in cyber security kicked off at this week’s Big Bang Fair at the NEC Birmingham, the largest celebration of science, techno…
Source: Digital Defender superheroes make debut to attract young people into careers in cyber security
While the DNS exploit CVE-2015-7547 was discovered a week ago, the code containing the flaw has been in use since May, 2008. CVE-2015-7547 works by allowing arbitrary code to execute on any system …
Source: The Skinny on CVE-2015-7547
Sitting down this morning with a much needed cup of coffee I was alerted to this startling post from a cNet news feed.
“Thursday is the deadline for colleges and universities that receive Title IV federal aid to have implemented antipiracy procedures on their campuses as part of the Higher Education Opportunity Act (HEOA) ” – cnet
Continue reading “Federal law requires schools to monitor network traffic”