Michael Patterson : Advanced NetFlow Traffic Analysis
Michael Patterson
Founder and Product manager for Plixer's Scrutinizer NetFlow and sFlow Analyzer as well as Flow Analytics.

As we Predicted in 2015, VW Managers are Being Indicted

On Thursday, a federal grand jury in Detroit, Michigan, indicted four Audi executives for playing a role in the diesel cheating scandals...

Full Story »

D.C., Virginia, Most Concerned About Phishing Attacks

Phishing is a global scourge. Just today, Danny Palmer at ZDNET writes an excellent piece about how cybercrime is a $600...

Full Story »

What's Big This Year in Telecom? Vote Now!

TMCnet and Andy Abramson and his company Comunicano are asking in the first annual VoIPWatch Poll.. The results will be revealed at...

Full Story »

PHISH360 Helps Solve The $12.5B Phishing Problem

The FBI says email attacks cost business $12.5 billion!This is in-part because hacking into a person's account could be as easy as...

Full Story »

Can't Miss at ITEXPO Jan 29-Feb 1st in Florida

Thanks to your feedback, we have been building ITEXPO into the most comprehensive business tech event around focusing on communications and IT.First...

Full Story »

At IoT Evolution See Cisco, Google, Nokia and What Matters

IoT Evolution Expo returns to Fort Lauderdale, Florida, Jan 29-Feb 1st, 2019 with an amazing agenda.Attendees tell us they love this event...

Full Story »

The Apple Stroke of Genius You Missed

If you listened to the financial experts after the news broke that Apple guided lower last night, phones are now commodities, Apple...

Full Story »

Security Analytics - Network as a Sensor

April 4, 2016

Security is going through an evolution in IT. The new assumption is that some malware will make it onto the network. This forces the security team to consider the actions they will need to take when following up on an event.  What details will they want access to? What devices on the network gather this information? How will they want to display it?

Cisco Cyber Threat Defense : 4 Tell-Tale Signs of Data Exfiltration

March 19, 2016

A potential threat could come from anywhere at any-time and it doesn’t have to start from the Internet.  Many threats are initiated internally by infected handhelds and laptop devices which walk right past the firewall.  Anti-virus has become nearly ineffective against targeted threats.  Even next generation firewalls aren't stopping the outbound connections created by unwanted data exfiltration. 

Phishing Attack Training

January 13, 2016

If you are being repeatedly targeted by a phishing attack, chances are you will eventually click. And if you end up infected, often times your computer will show no obvious signs of the virus or bot. What can you do?

Cisco nvzFlow Reporting

December 22, 2015

There has been lots of excitement this week at our company since the release of Cisco’s nvzFlow.  Companies which utilize the Cisco ASA for VPN access have the option to upgrade to AnyConnect 4.2.  With this latest release admins can configure remote users to export IPFIX right from their laptops to the flow collector for real time and future analysis.

 

Splunk NetFlow Support : Vendor Comparison

November 10, 2015

You are in luck because you have several options to get Splunk NetFlow support.  I know of three however, there are probably more. This post will list them all and discuss the benefits of each.

Software Defined Network: 8 BIG Benefits

October 23, 2015

Are you looking to get up to speed on the benefits of a Software Defined Network? This post will save you some time by providing 8 areas where SDNs promise to deliver.  It will also provide you with a few links where you can learn even more about the technology.

IPFIX Flow Direction and Packet Counters

July 8, 2015

In the world of NetFlow and IPFIX, flow direction is a topic that can confuse some of the best technical minds. It is an important concept in relation to routers because where information (e.g. byte counters) is gathered can have a significant impact on perceived accuracy.  This is sort of 3 part blog.  Although it isn't totally necessary, it might help the reader to understand a different type of flow directionality first as posted in my other blog. 

Monitoring DNS Traffic for Security Threats

May 13, 2015

As you are probably aware, the Domain Name Server (DNS) plays an important role in how end users connect to the internet. In order to gain some background before reading this blog, you may want to read my post on An Overview of DNS. Once you have a bit more technical information on the DNS behaviors, I think you will find this post more informative.



Building an Incident Response Team: 4 Specialties

February 23, 2015

Are you tasked with building an Incident response team for your company or organization? Have you thought about what their responsibilities will be, how they will be engaged and who the key members will be?

How To Investigate Malware

December 2, 2014

If you are looking to learn about how to investigate malware, chances are you are already infected and under the gun to uncover the source and clean up the mess. Here are a few things to consider before you dig in.

Featured Events