October 23, 2016 Multiphased DDoS Attack Causes Hours-Long Outages 3 min read - Though DDoS attacks using authentic IoT devices are easy to detect, they are one of the more difficult attack types to remediate.
Advanced Threats August 24, 2016 Understanding the SPF and DKIM Spam Filtering Mechanisms 5 min read - Sender Policy Framework and DomainKeys Identified Mail are two techniques that can be used to limit the amount of spam in inboxes.
Mainframe August 5, 2016 Protecting Your Network Through Understanding DNS Requests 3 min read - Sometimes it just takes a little common sense and knowledge of your system log files and the DNS requests contained therein to detect a data breach.
Advanced Threats April 28, 2016 Extracting Malware Behavior From DNS Records 2 min read - A recent threat report from Infoblox found that the underlying DNS hosting infrastructure of most malware is housed in the U.S. and Germany.
Mainframe March 9, 2015 The Absence of Evidence Is Not the Evidence of Absence 3 min read - Large corporations tend to have a lack of data or evidence. By completing their data set, they can gain insight into their systems and protect themselves.