Technical Insights > Network Visibility + Security

      Zero Trust Visibility

      Network Visibility + Security

      Zero Trust Visibility

      Gregory Copeland 2021.01.13

      Zero Trust Architecture (ZTA) is a term much discussed recently in the context of cybersecurity and touted as being offered by cybersecurity vendors. But there isn’t a single ZTA solution. The archite

      6 min read

      #Cybersecurity

      Are Network Packets really becoming increasingly difficult to collect?

      Network Visibility + Security

      Are Network Packets really becoming increasingly difficult to collect?

      Joel Rudman 2021.01.08

      I recently read the Gartner Market Guide for Network Performance Monitoring and Diagnostics (NPMD). Within the report it states that “Network Packets are Becoming Increasing Difficult to Collect” the

      6 min read

      #CloudLens #Packet Brokers #Hawkeye

      Sunburst: The SolarWinds Hack, How You Could be Affected, and How Keysight Can Help

      Network Visibility + Security

      Sunburst: The SolarWinds Hack, How You Could be Affected, and How Keysight Can Help

      Chuck Mcauley 2020.12.22

      impact On December 13th, CISA issued directive 21-01, instructing all customers of SolarWinds that a breach had been detected in their supply chain of software. Using a variety of tactics, nation stat

      4 min read

      #Cybersecurity

      TrickBot: A Closer Look

      Network Visibility + Security

      TrickBot: A Closer Look

      Edsel Valle 2020.12.21

      In early November, the Cybersecurity and Infrastructure Security Agency (CISA) released an advisory warning administrators in the healthcare and public sector that TrickBot is being used to disturb he

      11 min read

      #Cybersecurity

      HP Data Protector : Data Backup Solution | How To Setup

      Network Visibility + Security

      HP Data Protector : Data Backup Solution | How To Setup

      Ayan Saha 2020.12.15

      HP Data Protector HP Data Protector (Micro Focus) software is an automated backup and recovery software supporting disk storage or tape storage targets. It provides cross-platform, backup of data for

      8 min read

      Simulating Tricky Malware - Trickbot

      Network Visibility + Security

      Simulating Tricky Malware - Trickbot

      Chuck Mcauley 2020.12.15

      Trickbot is a nasty and highly advanced malware technology being used for many different malicious objectives.  Originally, Trickbot was used as a Banking Trojan and most recently we have seen Trickbo

      8 min read

      #Cybersecurity #Network Security

      FireEye Breach: Why You Could Be At Risk and How Keysight Can Help

      Network Visibility + Security

      FireEye Breach: Why You Could Be At Risk and How Keysight Can Help

      Mike Hodge 2020.12.10

      It’s a cybersecurity firm’s worst nightmare. On December 8, 2020, FireEye’s CEO revealed the company had been breached by a sophisticated hacking operation — most likely carried out by a malicious act

      9 min read

      #Network Security #Cybersecurity