Correlation, the Key to True Network Visibility

Correlation, the Key to True Network Visibility

Have you ever heard of the term ‘single pane of glass’ when IT people speak about monitoring tools … of course you have! It’s a oft used (and mis-used) term for a management console that presents data from multiple sources in a single display. I probably first heard...
Mitigating against the Recent FireEye Breach

Mitigating against the Recent FireEye Breach

A quick discussion of the recent FireEye breach and how to implement the FireEye Tool countermeasures into Byte25 to keep your network safe. If you are working in cyber security, you are probably aware of the recent FireEye breach. On the off chance that it passed you...
HTTP/3 is Coming – Look Busy

HTTP/3 is Coming – Look Busy

There is a new major version of HTTP on the horizon, HTTP Version 3. There is nothing you need to do, as HTTP/3 will sit quite happily alongside older versions 1 and 2 promising better performance. The major technical difference is that HTTP/3 does not use TCP as the...
Will TLS 1.3 split the Internet?

Will TLS 1.3 split the Internet?

A new version of Transport Layer Security (TLS) is coming… welcome TLS1.3! Well to be fair it is already here and has been for over 12 months, but as is the case with many Internet standards, adoption is taking some time. And for those not fully across exactly what...
The Irony of the Solarwinds Hack

The Irony of the Solarwinds Hack

I must confess, there was just the slightest sense of schadenfreude when I first heard of the Solarwinds hack. I mean, Solarwinds are a behemoth in the network performance monitoring space and a competitor to boot – so the idea that they had suffered a significant...