Flowmon blog

SUBSCRIBE TO RSS
: 51
Nowadays anyone can hold you to ransom on the internet

Nowadays anyone can hold you to ransom on the internet

In the past years illegal activities have been moving more and more into the virtual world. Many types of cyber-attacks are now also able to be used in specific “business” activities.

22.08.17
Artificial Intelligence will be the decisive factor in the fight against cyber-threats

Artificial Intelligence will be the decisive factor in th...

It has been almost 50 years since the world's first computer virus was seen. Over the years, it has evolved from the amusement of a handful of enthusiasts into an extensive business that is endange...

15.08.17 Bezpečnost
Three Steps to Monitor Cloud Services Usage

Three Steps to Monitor Cloud Services Usage

Are you using cloud services and don’t know why they are slow or how much data is transferred? The answers are in Flowmon.

Detect ExPetr/Petya wiper

Detect ExPetr/Petya wiper

A new malware attack is spreading on the internet and causes big troubles to users and administrators. Find out how Flowmon helps with this recent threat.

DDoS Protection in SDN Based Networking

DDoS Protection in SDN Based Networking

The efficient out-of-path DDoS detection and mitigation is not always available out of the box in virtual networking such as Contrail. Check this post to see how to generate NetFlow in Juniper Cont...

Hunting Frequent and Dangerous #1: Protection against Pharming, Phishing and Botnets

Hunting Frequent and Dangerous #1: Protection against Pha...

In our previous article we discovered the most common types of cyberattacks. We also learned how they are designed and how they operate. Such understanding helps us build adequate and effective pro...

28.06.17 Bezpečnost
New Generation of Flowmon Solution Arrives

New Generation of Flowmon Solution Arrives

The new generation of Flowmon solution has arrived. Besides improved solution performance, you can look forward to new and interesting features. Come and find out what is new.

Apply monitoring of AMT attack for your datacenters and users

Apply monitoring of AMT attack for your datacenters and u...

The attack to Intel based hardware is still going on via Intel® Active Management Technology.   More than one month known critical vulnerability CVE-2017-5689 (CVSS score 9.8) is not patched full...

14.06.17 Bezpečnost
1234567