Blogs

Garbage In Garbage Out: Why Threat Hunting is Only as Good as Your Network Data
Threat hunting, that proactive search for hidden nasties lurking in your network, is a cornerstone of modern cybersecurity. It’s about going beyond reactive alerts and actively seeking out the subtle signs of advanced persistent threats (APTs) and zero-day attacks. But here’s the cold, hard truth: your fancy threat hunting tools are only as effective as the data you feed them. Garbage in, garbage out, as they say. You can have the best threat hunters in the world, but if they’re working with incomplete or flawed data, they’re essentially searching in the dark. This is where real-time network data, Network Detection and

What CISOs Need to Know About the Executive Order on Improving the Nation’s Cybersecurity
In recent years, the frequency and severity of cyberattacks have made it clear that the digital landscape is more vulnerable than ever. In response, the U.S. government took a bold step to address these growing concerns with the Executive Order on Improving the Nation’s Cybersecurity, signed by President Joe Biden on May 12, 2021. This order isn’t just a call to action for government agencies—it has wide-reaching implications for private sector organizations, particularly those in critical industries. As a Chief Information Security Officer (CISO), understanding this order is key to ensuring that your organization is aligned with national cybersecurity priorities. Here’s

Network Observability Best Practices for Cybersecurity
In today’s digital landscape, network observability is crucial for maintaining robust cybersecurity. By providing comprehensive visibility into network activities, observability helps detect and respond to threats, identify vulnerabilities, and integrate with security tools like SIEM. This article explores best practices for network observability, recent examples, and the importance of network packet brokers. Detecting and Responding to Network Threats Effective network observability enables real-time detection and response to networ threats. Key practices include: Continuous Monitoring: Implement continuous network monitoring using tools like Zeek (formerly Bro) and Suricata to detect anomalies and potential threats promptly. Automated Alerts: Use automated alert systems, such as

Mastering the SEC’s Cybersecurity Mandates: A Strategic Blueprint for Compliance
The U.S. Securities and Exchange Commission (SEC) has recently enacted comprehensive cybersecurity regulations aimed at fortifying the integrity of investor data and the broader financial markets. These stringent mandates necessitate that public entities bolster their cybersecurity risk management, promptly report incidents, and enhance governance protocols.This article delves into the pivotal elements of these mandates and delineates pragmatic measures for organizational adherence. Deciphering the SEC’s Cybersecurity Directives The SEC’s newly minted directives pivotaround pivotal domains: Prompt Incident Reporting: Public entities are now mandated to report significant cybersecurity incidents within a four-day window post-materiality assessment. Such reports should encapsulate the incident’s characteristics, extent,

Network Analysis – Packet Capturing
Network packet analysis is a great method for diagnosing network problems. The data in the network or on the affected devices is recorded and examined with special analysis devices. This technique gives you a deep insight into the data packets and allows you to identify and correct errors very precisely. Network analysis by means of “capturing” procedures is one of the most reliable analysis methods, as you receive unaltered information from the corresponding network connections to your network, server, client and application and can evaluate this data without loss and without interference. The data to be analysed is passed on completely

Data Theft can Affect Anyone
Data loss or theft can be a worrying experience for any business. As major retailers, including Home Depot, Staples and Kmart, as well as banks and healthcare organisations have already experienced in the past year, cyberattacks can occur at any time and come from any source. Unfortunately, you can’t have it all in the modern world, because it’s impossible to automate your data and stay competitive if you insulate yourself from digital technology. Data collection is simply a part of today’s way of life that we all have to accept, but still, businesses increasingly need to guarantee a high level of

Virtualisation is Part of the Future of Networks
There is arguably no hotter buzzword in the technology industry right now than virtualisation – and for good reason. Organisations are turning to virtualisation in droves to reduce capacity and energy costs associated with running a traditional hardware network. Yet, nearly 60 per cent of organisations have seen a slowdown in their virtualisation efforts, according to a report by Nemertes Research. Even though organisations and businesses are reaping some of the benefits of virtualised networks, many of them are probably not making the most of them. Network engineers know all too well that a virtual topology is fundamentally different from architectures

How to Analyse Microbursts with Liveaction Omnipeek
A microburst is a local and sudden downburst (downdraft) within a thunderstorm, usually with a diameter of 4 km, although this is usually much smaller. Microbursts can cause significant damage to the surface and in some cases can even be life-threatening. In computer networks, a microburst is defined as a brief rush of data that typically lasts only milliseconds, but which overloads the link (Ethernet, Gigabit, 10 Gigabit, etc.). A microburst is a serious concern for any network because even a short term network overload means that some users will not be able to access the network. Because the industry standard

Ethernet Packets don’t Lie – Well, at Least in Most Cases
They tell the truth unless they are recorded incorrectly. In these cases, packets can indeed tell bold-faced lies. When searching trace files, we may come across symptoms in the packets that would make many a person frown in surprise. These are events that seem strange on the surface and can even distract our troubleshooting for a time. Some of these issues have actually misled network analysts for hours, if not days, causing them to chase issues and events that simply do not exist on the network. Most of these examples can be easily avoided by capturing packets from a network Test

Up to 14x Wireshark Performance Increase – Napatech Link™ Capture Software for Napatech SmartNIC
Solution Description Wireshark is a widely-used network protocol analyzer allowing users to see what is happening on their networks at a microscopic level. It is the de facto standard across many commercial and non-profit enterprises, government agencies, and educational institutions for troubleshooting and protocol analysis. Wireshark has a rich feature set including deep inspection of hundreds of protocols, live capture and offline analysis. However, as capable as Wireshark is at inspecting and analyzing network protocols, it will only be as effective as its implementation. The ability to capture and analyze traffic at lossless rates is of the utmost importance for Wireshark