Cyber security and packet capture: making the connection


Download With the recent Yahoo data breach, we still do not have the details of the attack and are therefore, yet to know about the resulting implications for the 500million users that it will affect. When cyber attacks happen, extracting information related to the attack from the servers, networks and applications scattered across many different locations is a huge hindrance for organizations. In order to solve this problem, Peter Ekner, CTO at Napatech, urges readers with this article, to draw their attention away from the devices to the actual data flowing in their networks. According to thim collecting information on network data will help reconstruct ac omplete picture of what occurred by deploying full packet capture capabilities at strategic points across the network infrastructure.

0 Comment

Leave a Reply

Captcha image