Protecting Windows XP from Exploit With Microsoft discontinuing support of Windows XP, organizations need guidance on how to protect the legacy machines they can't replace. Read more about Protecting Windows XP from ExploitCharles Herring's blogComments1932 reads
Reigning in External Services with NetFlow NetFlow analysis can be an effective way of determining what cloud services are in use and monitoring them for violations. Read more about Reigning in External Services with NetFlowCharles Herring's blogComments2238 reads
Monitoring Protected Data with NetFlow Behavioral analysis of NetFlow can alert to policy violations as well as suspicious and anomalous activity concerning protected data such as card holder (PCI), patient records (HIPAA) as well as PII and trade secrets. Read more about Monitoring Protected Data with NetFlowCharles Herring's blogComments3252 reads