Blogs

Illuminating the Shadows: The Indispensable Role of Network Visibility in Contemporary Cybersecurity

  In the ever-escalating contest against sophisticated cyber adversaries, the principle that threats unseen cannot be effectively countered has become a paramount concern. Deficiencies in comprehensive network visibility invariably create exploitable blind spots, affording malicious actors the opportunity to infiltrate digital infrastructures, traverse laterally within them, and exfiltrate sensitive data over protracted periods. This extended “dwell time” demonstrably exacerbates the resultant damage and financial implications associated with data security incidents. The gravity of this challenge is consistently highlighted by authoritative industry analyses. The IBM Cost of a Data Breach Report 2024 reveals a concerning trend, with the global average cost of

Read More »

Understanding the Digital Operational Resilience Act (DORA) and Its Implications for Network Observability

As we navigate the evolving landscape of digital threats, the Digital Operational Resilience Act (DORA) emerges as a critical regulatory framework for financial entities within the European Union. Effective from January 17, 2025, DORA mandates that financial institutions, including payment institutions, fund managers, and credit institutions, must ensure robust digital operational resilience to withstand, respond to, and recover from ICT-related disruptions and threats. Key Components of DORA DORA is built on five foundational pillars: ICT Risk Management: Establishing a comprehensive governance and control framework to manage ICT risks effectively. This involves well-documented strategies, policies, and procedures. ICT-related Incident Management, Classification, and

Read More »
Garbage-in-Garbage-out

Garbage In Garbage Out: Why Threat Hunting is Only as Good as Your Network Data

Threat hunting, that proactive search for hidden nasties lurking in your network, is a cornerstone of modern cybersecurity. It’s about going beyond reactive alerts and actively seeking out the subtle signs of advanced persistent threats (APTs) and zero-day attacks. But here’s the cold, hard truth: your fancy threat hunting tools are only as effective as the data you feed them. Garbage in, garbage out, as they say. You can have the best threat hunters in the world, but if they’re working with incomplete or flawed data, they’re essentially searching in the dark. This is where real-time network data, Network Detection and

Read More »

What CISOs Need to Know About the Executive Order on Improving the Nation’s Cybersecurity

In recent years, the frequency and severity of cyberattacks have made it clear that the digital landscape is more vulnerable than ever. In response, the U.S. government took a bold step to address these growing concerns with the Executive Order on Improving the Nation’s Cybersecurity, signed by President Joe Biden on May 12, 2021. This order isn’t just a call to action for government agencies—it has wide-reaching implications for private sector organizations, particularly those in critical industries. As a Chief Information Security Officer (CISO), understanding this order is key to ensuring that your organization is aligned with national cybersecurity priorities. Here’s

Read More »

Network Observability Best Practices for Cybersecurity

In today’s digital landscape, network observability is crucial for maintaining robust cybersecurity. By providing comprehensive visibility into network activities, observability helps detect and respond to threats, identify vulnerabilities, and integrate with security tools like SIEM. This article explores best practices for network observability, recent examples, and the importance of network packet brokers. Detecting and Responding to Network Threats Effective network observability enables real-time detection and response to networ threats. Key practices include: Continuous Monitoring: Implement continuous network monitoring using tools like Zeek (formerly Bro) and Suricata to detect anomalies and potential threats promptly. Automated Alerts: Use automated alert systems, such as

Read More »

Mastering the SEC’s Cybersecurity Mandates: A Strategic Blueprint for Compliance

The U.S. Securities and Exchange Commission (SEC) has recently enacted comprehensive cybersecurity regulations aimed at fortifying the integrity of investor data and the broader financial markets. These stringent mandates necessitate that public entities bolster their cybersecurity risk management, promptly report incidents, and enhance governance protocols.This article delves into the pivotal elements of these mandates and delineates pragmatic measures for organizational adherence. Deciphering the SEC’s Cybersecurity Directives The SEC’s newly minted directives pivotaround pivotal domains: Prompt Incident Reporting: Public entities are now mandated to report significant cybersecurity incidents within a four-day window post-materiality assessment. Such reports should encapsulate the incident’s characteristics, extent,

Read More »

Network Analysis – Packet Capturing

Network packet analysis is a great method for diagnosing network problems. The data in the network or on the affected devices is recorded and examined with special analysis devices. This technique gives you a deep insight into the data packets and allows you to identify and correct errors very precisely. Network analysis by means of “capturing” procedures is one of the most reliable analysis methods, as you receive unaltered information from the corresponding network connections to your network, server, client and application and can evaluate this data without loss and without interference. The data to be analysed is passed on completely

Read More »

Data Theft can Affect Anyone

Data loss or theft can be a worrying experience for any business. As major retailers, including Home Depot, Staples and Kmart, as well as banks and healthcare organisations have already experienced in the past year, cyberattacks can occur at any time and come from any source. Unfortunately, you can’t have it all in the modern world, because it’s impossible to automate your data and stay competitive if you insulate yourself from digital technology. Data collection is simply a part of today’s way of life that we all have to accept, but still, businesses increasingly need to guarantee a high level of

Read More »

Virtualisation is Part of the Future of Networks

There is arguably no hotter buzzword in the technology industry right now than virtualisation – and for good reason. Organisations are turning to virtualisation in droves to reduce capacity and energy costs associated with running a traditional hardware network. Yet, nearly 60 per cent of organisations have seen a slowdown in their virtualisation efforts, according to a report by Nemertes Research. Even though organisations and businesses are reaping some of the benefits of virtualised networks, many of them are probably not making the most of them. Network engineers know all too well that a virtual topology is fundamentally different from architectures

Read More »

How to Analyse Microbursts with Liveaction Omnipeek

A microburst is a local and sudden downburst (downdraft) within a thunderstorm, usually with a diameter of 4 km, although this is usually much smaller. Microbursts can cause significant damage to the surface and in some cases can even be life-threatening. In computer networks, a microburst is defined as a brief rush of data that typically lasts only milliseconds, but which overloads the link (Ethernet, Gigabit, 10 Gigabit, etc.). A microburst is a serious concern for any network because even a short term network overload means that some users will not be able to access the network. Because the industry standard

Read More »

STAY IN TOUCH

Follow Our Social Media and Subscribe to Our Newsletter