Protecting against cyber-attacks is becoming a top-priority for corporates around the world. An effective strategy for the protection against such events should focus at least on two dimensions, namely threat intelligence and perimeter defense.
Using ntopng and nscrub we demonstrate how to effectively identify and mitigate threats in corporate networks with practical recommendations, guidelines and future directions to effectively implement a protection strategy using the tools introduced.
The correct configuration and scheduling of downtime is an essential element of a monitoring system for several reasons: Mitigating notificationsProviding IT operations and Service Desk teams with timely information about when monitored systems may be subject to faults due to Read More
These days we live in a data-driven world, where the collection and analysis of data empowers not only companies but also individuals to plan future actions based on the information that is extracted. NetEye enables both the collection and analysis Read More
We fixed a bug for which the healthcheck 00400_local_neteye_target_services_are_disabled was failing on NetEye Satellites due to some services enabled by default on the NetEye Satellites. The healthcheck now does not control the state of such services on Satellites. For NetEye Read More
We fixed a bug for which the healthcheck 01220_telegraf_retention_policy_set was failing on NetEye Satellites. The healthcheck is now skipped on Satellites. For NetEye 4.22 we updated the following packages: icingaweb2-module-analytics, icingaweb2-module-analytics-autosetup to version 1.48.3-1
On January 29th, I attended my first CTF (capture the flag) competition: the Insomni'hack teaser.Based on my skills, I decided to go for the challenge called Vault which consists of a web-based vault of five pages: a home page, one Read More