Security Spot

Passive Discovery and Exploitation of Open SMB Shares

Server Message Block (SMB) shares are a critical component to most organizations—allowing for a central repository of files and other items that people need to access and share to do their jobs. As a security professional, it is critical that you identify these vulnerabilities within your environment and lock them down.

Read More

Cybersecurity Advice for President-Elect Trump: Maintain Bi-Partisan Momentum and Step on the Gas

As Donald Trump prepares to assume the presidency, cybersecurity strategy should be high on his priority list. Timing is of the essence, as those who want to cause harm are not taking a hiatus as our country moves through this massive transition of power. To ensure the safety of our country, our citizens, and the operation of our financial and critical infrastructure, I strongly recommend President-Elect Trump support the Cybersecurity National Action Plan (CNAP) enacted by President Obama in February 2016.

Read More

Detecting the BlackNurse DDoS Attack with LogRhythm NetMon

The security operations centre (SOC) at Danish telecoms operator TDC recently published a report with regards to an ICMP based DoS/DDoS style of attack. In the spirit of proactive defense, I thought it was a good idea to see how this type of attack would look within LogRhythm NetMon Freemium.

Read More

The Definitive Guide to Security Intelligence and Analytics

In the Definitive Guide to Security Intelligence and Analytics e-book, you'll learn how your organization can benefit from adopting security intelligence and analytics, how to evaluate possible solutions, and tips and tricks on deploying a solution so you can get the most value from it. Read more to learn how to automate event discovery through security analytics and to get the free e-book.

Read More

Detecting Home Network Issues with Network Monitor

Analyzing home network traffic can be highly valuable as you can find previously unknown issues smoothly and efficiently by using NetMon. In addition to security issues, you can also track usage statistics and determine what (or who) is utilizing the most bandwidth on your home network.

Read More