New & Notable
Monitoring Network Traffic and Network Forensics News
September 17, 2014
The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.
February 07, 2014
Anomaly-based user activity monitoring is the only measure that can stop Target-like attacks that utilize stolen credentials, experts say.
October 15, 2013
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true.
September 05, 2013
Damballa is adding HTTP request profiling to its advanced threat protection platform to detect malware that bypasses traditional security approaches.
Monitoring Network Traffic and Network Forensics Get Started
Bring yourself up to speed with our introductory content
The rapid evolution of networks has created a number of challenges for security admins, especially when it comes to network security audits. Expert Kevin Beaver offers pointers on performing a next-gen network security audit. Continue Reading
Dave Shackleford brings you up to speed on what you need to know about continuous monitoring for network security. Continue Reading
Organizations pursue various approaches to continuous monitoring, but the first question is always what to monitor. Continue Reading
Evaluate Monitoring Network Traffic and Network Forensics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A continuous monitoring program can improve everything from configuration and patch management to event monitoring and incident response. Continue Reading
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple or complex, depending on your technology, budget, and compliance and security requirements. Even for ... Continue Reading
A new appliance claims to provide an invisibility cloak to hide sensitive network traffic from malicious attacks. Is it too good to be true? Network security expert Kevin Beaver discusses the reality of invisibility cloaks. Continue Reading
Manage Monitoring Network Traffic and Network Forensics
Learn to apply best practices and optimize your operations.
The next-generation network -- one that must encompass the cloud, mobility and Internet of Things devices -- requires a different standard of network monitoring tools. Learn about new and improved tools that conquer those challenges. Continue Reading
In this video, CBT Nuggets' Keith Barker shows how to use the free Wi-Fi network monitoring tool Kismet to find possibly malicious wireless networks. Continue Reading
Practicing incident response for a DNS attack will help enterprises recover faster. Nick Lewis offers incident response planning best practices. Continue Reading
Problem Solve Monitoring Network Traffic and Network Forensics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading
TCP port 445 -- a traditional Microsoft networking port -- is a common attack vector. Network security expert Kevin Beaver explains how to detect and defend against port 445 attacks. Continue Reading