2 min
Cloud Security
Top Challenges for Security Analytics and Operations, and How a Cloud-Based SIEM Can Help
To keep up and combat key security operations challenges, many organizations are making the move to the cloud for broader, more flexible detection and response coverage of their ever-changing security environments.
5 min
Network Traffic Analysis
Top 5 Ways to Get a Network Traffic Source on Your Network
In this blog, we take a look at the top five ways to get a network traffic source on your network.
5 min
Detection and Response
How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response
In this blog, we discuss how Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response
2 min
InsightIDR
How to detect SMBv1 scanning and SMBv1 established connections
How to use network traffic analysis (NTA) to detect SMBv1 scanning and SMBv1 established connections.
4 min
Application Security
4 Differences Between Network Security & Application Security
Tomato, tomato, potato, potato, network security
[http://glr.eduftp.net/fundamentals/what-is-network-security/] and web
application security
[http://glr.eduftp.net/fundamentals/web-application-security/]. Two things that
may seem similar, they are actually quite different. Network security (also
known as vulnerability assessment or vulnerability management
[http://glr.eduftp.net/solutions/vulnerability-management/]) has been around
for quite some time and is something most security practition
2 min
InsightIDR
How to Detect BitTorrent Traffic on your Network
Learn how to detect BitTorrent traffic on your network to capture metadata such as INFO-HASH, IP addresses, and usernames.
3 min
InsightIDR
3 Ways for Generating Reports on WAN Bandwidth Utilization
3 popular ways of getting visibility into WAN bandwidth monitoring, one of the most popular use cases for network traffic analysis.