Numerous best practices help to deliver robust cybersecurity. Adopting these will involve combining many of the technologies already outlined in the previous entry.
A newly analyzed threat, Chrysalis, is a sophisticated backdoor attributed to the Chinese APT group Lotus Blossom. The malware employs advanced evasion techniques including heavy obfuscation, API hashing, dynamic DNS resolution, custom encryption and stealthy C2 communication disguised as legitimate traffic.
Cybersecurity refers to the processes and technology used to protect information technology networks, data, people, servers, endpoint devices and other IT-related systems from cyberattacks. The need for this protection has never been greater. All organizations (in both private and public sectors) now exist in a threat landscape that allows attacks against their IT infrastructure.
Log management and Network Detection and Response (NDR) solutions are closely related but offer different layers of visibility. Rather than overlapping, they complement each other, together providing a connected view of what’s happening in your environment. How exactly? Let’s take a closer look.
At Progress, we continue to develop and enhance the Progress Flowmon product family. The latest update brings the core Flowmon product to release 13.0, and it includes remarkable performance improvements, strengthened security and expanded protocol support. Full details of what’s new and improved in the latest release are available on the Flowmon product page. In this blog, we’re excited to highlight the newest features and improvements to the Flowmon solution.
Higher education institutions face unique cybersecurity challenges due to their complex networks, diverse user base and open academic environments. With thousands of students, staff and faculty members accessing resources from various locations and devices, universities must have visibility of what’s happening on their networks and robust and responsive cybersecurity protection to help safeguard them.
It’s a question we hear often - how do we use the Progress Flowmon solution to block an attack? Flowmon is not an inline appliance that stands in the path of inbound traffic, so we partner with third-party vendors who supply equipment such as firewalls or unified security gateways. In this post, we’re going to show you how to instruct Fortinet’s firewall FortiGate via Flowmon ADS to block traffic in response to a detected anomaly or attack.
Cybersecurity threats don’t come solely from external attackers. Insider threats also require your attention. Insider risk originates from employees, contractors or business partners who possess legitimate access to IT systems for their work tasks. They can access valuable data and systems that, if exposed or have some data stolen, could harm an organization’s reputation.
Progress is pleased to announce that we have updated our industry-leading Flowmon Anomaly Detection System (ADS) to version 12.5. The latest update has these additions: Let’s take a look.