• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:DDoS attack

Firewall attacks in history and tips to enhance your firewall security

Log360 | December 16, 2024

Firewall attacks in history and tips to enhance your firewall security

Firewalls are the guardian of your network, effectively blocking unnecessary ports and...

How to avoid getting tricked by hackers this Halloween

General | October 29, 2018

How to avoid getting tricked by hackers this Halloween

While everyone prepares for the frights of Halloween, there's a real evil lurking just...

IT Security | May 18, 2016

What you ought to know about the common cybercrime techniques of 2016

2015 was the year of bold and sophisticated cybercrimes in Australia when major...

This Week's Five: Arm Your IT; Secure Your Network

General | June 29, 2013

This Week's Five: Arm Your IT; Secure Your Network

This Week’s Five is a weekly column of five interesting reads from all over the web,...

General | December 4, 2012

Can your organization be Hack Immune?

This past few months witnessed a record breaking global level of malware threats and APTs ...

Security Analytics in NetFlow Analyzer

NetFlow Analyzer | June 5, 2012

Security Analytics in NetFlow Analyzer

With Advanced Security Analytics module(ASAM) in NetFlow Analyzer, Security Analyst job on...

NetFlow Analyzer | March 8, 2012

SYN flood detection in NetFlow Analyzer

DoS attack can be explained in simple way by defining as a flood of illegitimate traffic...

NetFlow Analyzer | April 21, 2011

Understanding TCP-based anomalies using NetFlow Analyzer

In our previous blog, post we discussed the problems classified by the Advanced Security...

NetFlow Analyzer | March 24, 2011

Detecting Suspicious Flows using NetFlow Analyzer

Network security has always been the top priority of Network administrators all over the...