We had the pleasure of supporting the Software Engineering Institute at Carnegie Mellon University’s conference, FloCon: Using Data to Defend. The presentations and discussions at the event provided validation that changes are coming to network and cyber security. More mathematical solutions are being developed to fuel machine learning and algorithms to combat malicious and other network traffic of interest. If you missed the event, an overview and video of our presentation is below.
2019 is right around the corner, and CIOs are prepping for the new year. Specifically, CIOs are making plans as it relates to cybersecurity and data privacy management. Grappling with how to make informed business decisions with real-time technologies, increasing the use of orchestration and automation along with continuous monitoring, to enable real-time detection, decisioning and remediation.
MantisNet is a proud sponsor and participant at the upcoming FloCon 2019 conference in New Orleans, January 7-10, 2019.
We were excited to be accepted as a speaker and sponsor for the annual Software Engineering Institute at Carnegie Mellon University’s event. The theme for FloCon 2019 is ‘Using Data to Defend’ and the forum to “explore large-scale, next-generation data analytics in support of security operations” fits squarely within the core mission and vision of MantisNet.
Before we can address the optimum method for responding to the continuously evolving cyber threat landscape, we need to understand the sources and types of data available from which we can understand and make decisions about the health and security of our systems.
Verizon released its latest Data Breach Investigation Report (DBIR) highlighting the latest trends in malware and cyber crime, covering 53,000 incidents and 2,216 confirmed breaches. The report reveals that botnets are the most widespread, dangerous attacks to date. The number of botnet attacks reported was so numerous that all 43,000 breaches (mainly on financial data) were excluded from overall statistics and given a separate section of its own. With botnet breaches on the rise, Verizon's report confirms that monitoring network traffic is more important than ever.
Utilize Real-Time Monitoring to Protect Your Network
With billions of websites on the Internet, separating the good from the bad is nearly impossible for your IT team. However, by combining specific tools with streaming analytics, you can better secure and harden your network into a real-time, dynamic cyber security system that identifies potential attacks and blocks them during initial DNS exchanges - effectively stopping security breaches before they have the potential to reach your users.
How to Defend Against Credential Stuffing and Account Takeover Attacks
Cyber-crime is no longer a single attacker hacking away at your defenses. With automated credential stealing and account takeover tools, an attacker can send armies of bots to steal valuable information from thousands of victims and make hundreds of thousands of financial transactions.
What is 100G Load Balancing?
As organizations continue to transition to high-speed network infrastructure, engineers responsible for network monitoring find themselves in need of an answer to the question, "How does one go about monitoring 100G network links?" The unique characteristics of high-speed networks make this a serious technical challenge.
100G Networking Trends
2017 proved to be an explosive year for 100G, as well as for other "high-speed" networking technologies ("high-speed" being anything 25G+). According to Crehan Research, the data center Ethernet switching market saw its strongest growth in five years during 2017.
Tags: network engineering