NetFlow Ninjas Blog
POSTED BY Keith Wilson on 12.23.2014
This is the long-anticipated (okay, maybe I just took my sweet time getting around to it) part 4 for the “When I Attack” series. For those that haven’t been following along, you may want to read the first three parts where I discuss reconnaissance , weaponization , and then delivery/initial...
POSTED BY TK Keanini on 12.17.2014
Now that we’ve reflected on predictions past , it’s time to look towards the future and consider the potential industry challenges we’ll be facing in the not so distant 2015. While we can expect to see the return of some of the issues we faced in 2014, there are still a number of new threats that...
POSTED BY Andrew Akers on 12.16.2014
On December 15, Lancope’s Customer Success department will launch its new Customer Community and learning courses. These new capabilities mark a company-wide commitment to helping StealthWatch users get the most from their StealthWatch System and meet their organization’s security goals. A number...
CATEGORIES: 
POSTED BY Andrew Akers on 12.10.2014
The security industry has had its eyes on Iran for a long time. Teams of hackers such as the Iranian Cyber Army, Ashiyane, Islamic Cyber Resistance, and others have been documented compromising networks, defacing websites and stealing data. The cybersecurity company Cylance recently released a...
POSTED BY TK Keanini on 12.09.2014
As the New Year comes closer, it is time to look back on my security predictions for 2014 to see what I got right, what I got wrong, and what surprised me. I made three major predictions for 2014. I predicted incident response would finally mature as an essential business practice, two-factor...
POSTED BY Coty Sugg on 11.20.2014
Hardly a week goes by that we don’t hear about another major retail chain, bank, or major municipal enterprise being the vicitm of a major data breach or information leak. Cybercrime continues to be a growing threat and poses a number of distinctive challenges to multiple industry types...
POSTED BY TK Keanini on 11.20.2014
As many of us recall, the holiday season last year was marred by a slew of high-profile data breaches targeting major retailers, including the largest retail hack in U.S. history. As we gear up for Black Friday, Cyber Monday and the remainder of the holiday shopping season, it’s important that we...
POSTED BY Andrew Akers on 11.14.2014
Whether they realize it or not, all enterprises have sensitive information to protect. Valuable data such as credit card details, trade secrets, and patient information is more plentiful and accessible online today than ever before. Cyber criminals know this and are constantly developing new tools...
POSTED BY Coty Sugg on 11.14.2014
Pop quiz! What does a cyber criminal look like? What are the defining characteristics of a cyber criminal’s attire? Do they prefer hats or maybe they opt to go chapeau-less. What about their mannerisms? Are they neat, polite, and slick or maybe they’re l33t, rude, and inclined to troll YouTube...
POSTED BY Andrew Akers on 11.10.2014
After the Break-In: Lateral Movement and Visibility in Data Centers Securing the Perimeter Isn’t Enough Every year, organizations pour more and more money into network perimeter defenses. Vulnerability management, bigger and better firewalls, and intrusion prevention systems all make up the big...

Pages