Tag: Network monitoring and analysis

Check all articles
Blog
Why do I need NetFlow?
Monitoring and managing network traffic can be a complex task. This is where NetFlow comes into play.
Marcin Kaźmierczak
20/05/2025
Read more >
Blog
Data Deduplication and NetFlow: How to Save Storage Space and Improve Data Analysis
Discover how to save storage space and improve data analysis using this simple methods.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How to detect network IoCs (URLs, Domains and IPs) in context of SNOWYAMBER, HALFRIG and QUARTERRIG in Sycope NSM?
SKW and CSIRT NASK observed a wide-ranging espionage campaign related to Russian secret services.
Maciej Wilamowski
16/04/2025
Read more >
Blog
How to effectively implement the threat modeling process?
What is threat modelling and how to design the process that can be applied to a wide range of infrastructures and business models.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
NetFlow as valuable data source for SecOps
How to use inter-system correlations, optimizing work of SIEM systems and processing billions of flows in dedicated system.
Marcin Kaźmierczak
16/04/2025
Read more >
Blog
Can network flow monitoring be important source of data for detecting DoS attacks?
Each Incident handler should have a Network Visibility system in their arsenal to be able to analyse the network characteristics.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
Detecting Network Scans using NetFlow
Scanning the network leaves a clear network traffic footprint. A footprint that is easy to spot by analysing NetFlow. Sounds intresting?
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How historical data insights give us great analytical capabilities
Tools that analyse historical data insights come to the rescue when we need to know how many internet connections they are now or tomorrow.
Maciej Wilamowski
16/04/2025
Read more >
Blog
How to detect crypto mining in your organization?
How could we try to detect the Resource Hijacking technique, a MITRE ATT&CK technique related to crypto mining activity?
Marcin Kaźmierczak
16/04/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.