Tag Archives security forensics

Security Forensics

Another day, another cyberattack. Just as companies were recovering after the WannaCry attack, a number of organizations were hit by Petya… or NotPetya. Name it as you see fit. In a matter of just two months, two devastating ransomware attacks have crippled networks globally. Clearly, security threats are multiplying in intensity and complexity. But what […]

benoitwannacry

In the case of WannaCry and other exploits, capturing traffic in the core of the network with the ability to go back in time for several days is a best-of-breed solution for both security and network teams. The recent WannaCry exploit (WannaCrypt/WannaCrypt0r and variants) is ransomware that was leaked by the Shadow Brokers hacker group […]

2014-nov-banner

Network security forensics offers insight for enterprises after WannaCry ransomware exploit. Security is a top concern for anyone running a network today. The recent WannaCry ransomware attack and other high-profile hacks have shined a new light on the fact that security strategies in the enterprise must constantly evolve to meet the challenges of new and […]

banner-direction

Prior to purchasing the Observer Platform for network monitoring and security forensics, Cisco Systems was experiencing a lack of visibility during and after network events. Headquartered in San Jose, California, Cisco Systems designs, manufactures, and sells networking equipment. With nearly $50 billion in revenue and over 70,000 employees, Cisco is also the largest networking company […]

banner-event

What happened in 2016, stays in 2016 right? At least that’s what IT teams hope as they recount some of their most problematic network challenges – and how they eventually resolved them with the Observer Platform. A Retailer’s Remorse Major retailers often rely on Black Friday deals to remain profitable. In some cases, technical snafus can […]

2016-feb-banner

For a worldwide leader in online gaming technology, service degradation and application issues are important considerations in the ongoing quest for end-user satisfaction. A security breach, however, is an entirely different enemy and can quickly spell ‘game over.’ “If there are any application issues, they want to know about it,” says Viavi Solutions Western Territory […]

Close