Security That’s Not Security – Network Discovery

Security That’s Not Security – Network Discovery

Today I’m going to discuss the concept of discovery and its central role in network security. This discussion is part two of a series that looks at those tools and components that are not often thought of as being security focused but play a critical role in network security. From […]

Security That’s Not Security Could Be Your Biggest Security Hole

Security That’s Not Security Could Be Your Biggest Security Hole

What do you think about when you hear the term network security? Chances are that the things that come to mind include firewalls, IDS/IPS, vulnerability scanners, and the like. What they all have in common is that each has a “security” function as a primary capability. All have their own […]

When is a Firewall Not a Firewall?

When is a Firewall Not a Firewall?

Naming products can be tricky. A name, at its best, clearly articulates the function of something and can even invoke a sense of its qualities through the association the name draws to mind. But then there is the other side where the name tells us nothing about the product. Even […]

Tools Consolidation – Too Much of a Good Thing?

Tools Consolidation – Too Much of a Good Thing?

Over the last few years I’ve spent a fair bit of my time leading Empowered’s Monitoring Tools Assessment practice. In this role, I work with customers to help them understand what capabilities they have, how those compare to the operational requirements they are trying to meet, and provide recommendations on […]

Training versus Education and its Impact on Success

Training versus Education and its Impact on Success

I was talking with a senior engineer the other day who had recently attended some vendor provided courses for their DDI appliances. When I asked him about his experience with them, he said that he was very impressed not only with the level of detail that they went into about […]

First DNS over HTTPS Malware Exploit Described

First DNS over HTTPS Malware Exploit Described

On the same week that we published our post about Google announcing general availability for its public DNS over HTTPS (DoH) implementation, Netlab published its first description of malware using DoH as a mechanism to hide its DNS traffic. The malware, named Godlua, is a Lua-based backdoor currently affecting some Linux servers […]

Google DNS over HTTPS – Good for Users, a Challenge for Enterprise…

Google DNS over HTTPS – Good for Users, a Challenge for Enterprise…

RFC 8484 defining DNS over HTTPS (DoH) has been around for a while with organizations such as CloudFlare already offering production solutions in the space. That being said, there is nothing like having Google announce general availability of their DoH service to really get the industry buzz going. Well that’s […]

Technology Refresh – Obligation or Opportunity?

Technology Refresh – Obligation or Opportunity?

So, it’s that time again, technology refresh. The obligatory replacement of technology that is moving out of vendor support. As with so many things in life, you have the choice to approach this as a glass half empty or as a glass half full situation. Sure, you can see a […]

Realize the Full Value of Your NetMRI Investment

Realize the Full Value of Your NetMRI Investment

How Does Your Current NetMRI Environment Measure Up?  Knowing how your current NetMRI environment measures up is vital to the success of your network. A NetMRI Health Check is a low-cost, high-value evaluation of your existing NetMRI installation. It includes the following: Managed device discovery issues NetMRI software upgrade path […]

Do You Even Need a Monitoring Team?

Do You Even Need a Monitoring Team?

It is hard to argue that the people that know the most about what a service does and how it behaves are the folks that designed and built it. It follows that if you want to monitor that service to ensure that it behaves as expected, those same folks would […]