Looking East and West NetFlow can provide an efficient way of monitoring traffic moving laterally across a network. Read more about Looking East and WestCharles Herring's blogComments2309 reads
APT Number One The systematic problems the Mandiant APT1 report revealed in enterprise surveillance efforts. Read more about APT Number OneCharles Herring's blogComments2018 reads
Before There Was a Great Wall How the importance of physical surveillance throughout human history teaches us why we are failing at network security and how we can fix it. Read more about Before There Was a Great WallCharles Herring's blogComments2659 reads
Anatomy of an SQL Injection What SQL Injection is and how intelligent monitoring of NetFlow can detect and deter it. Read more about Anatomy of an SQL InjectionCharles Herring's blogComments4214 reads
Are My Computers for Rent? Using NetFlow to determine if network resources are being sold on the black market. Read more about Are My Computers for Rent?Charles Herring's blogComments2281 reads
Day Zero Is How Long??! We are taking a retarded amount of time to discover unknown (zero day) threats and how we can reduce that window. Read more about Day Zero Is How Long??!Charles Herring's blogComments2687 reads
Network Security School of Fort Knox: Part 6 The last installment explains the importance of knowing what to do when a breach is detected. Read more about Network Security School of Fort Knox: Part 6Charles Herring's blogComments1814 reads
Network Security School of Fort Knox: Part 3 Not all types of cyber attacks are the same. In this third installment we look at different exploit types and their delivered payloads. Read more about Network Security School of Fort Knox: Part 3Charles Herring's blogComments2020 reads