Network Analysis: The Future is Now, and it’s FREE
Anyone in the cyber field that has been involved in a network investigation to determine the source and scope of a compromise knows that the process is time intensive. Traditionally, such investigations require logfiles from various sources: routers, firewalls, intrusion detection systems, and maybe packet captures from a sniffer if you have one. Reconstructing the […]