Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Detecting Cryptojacking with Progress Flowmon

In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.

Gartner Lays out Three Use Cases of Network Detection and Response (NDR) Adoption

The Gartner recent report, “Emerging Tech: Top Use Cases for Network Detection and Response”, lays out three primary use case drives, which include: Before we dive deeper into Gartner findings, let’s talk about NDR from a high level.

The Role of Artificial Intelligence (AI) in Digital Transformation

In today's fast-paced digital landscape, it's not enough for companies to merely adapt to change; they must lead the way in embracing transformative technologies because it’s the only way to grow and stay competitive. In this blog, we'll explore how the fusion of digital transformation and AI transformation is shaping business environments around us.

After a Ransomware Infection - Enhancing Security for Your Infrastructure Against Further Intrusion

In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage. Webinar: The First 48 Hours of Ransomware Incident Response.

The First 48 Hours of Ransomware Incident Response

The initial response to a ransomware attack is crucial for determining the damage in terms of downtime, costs, data loss and company reputation. The sooner you detect the activity associated with ransomware, the sooner you can slow its spread. From there, you can take remedial actions to significantly reduce the effects of the attack.

The Cybersecurity Threat Landscape in 2024

Over the last few years, the number and severity of cyberattacks against organizations have significantly increased. These attacks come in various forms, including ransomware, distributed denial-of-service (DDoS), data breaches, insider threats and many more. Despite the best efforts of many cybersecurity professionals to minimize these threats, it appears there will be no decrease in the threat level in 2024.

Meeting the SEC's New Cybersecurity Rules: How Flowmon Empowers Companies to Comply

The much-anticipated cybersecurity rules by the US Securities and Exchange Commission (SEC) for public companies have arrived, signaling a significant step forward from the proposed rules released in March 2022. These final rules, effective July 26, 2023, introduce new obligations that public companies must adhere to, promising a more secure and transparent corporate landscape. However, these regulations bring significant compliance challenges and litigation risks.

Application-down Troubleshooting Through the Eyes of a Network Engineer

Imagine yourself wearing the hat of a network engineer, where no two days at work are alike. In this dynamic environment, you're often the first point of contact when something remotely IT-related goes wrong, with users frequently pointing fingers at the network. Yet, your expertise lies in knowing the intricacies of network traffic, a vital skill for addressing operational and performance challenges.

What is Zero Trust and How IT Infrastructure Monitoring (ITIM) Makes it Happen

When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.

Meeting the SEC's New Cybersecurity Rules: How Flowmon Empowers Public Companies To Comply

The much-anticipated cybersecurity rules by the U.S. Securities and Exchange Commission (SEC) for public companies have arrived, signaling a significant step forward from the proposed rules released in March 2022. These final rules, effective July 26, 2023, introduce new obligations that public companies must adhere to, promising a more secure and transparent corporate landscape. However, these regulations bring significant compliance challenges and litigation risks.