What do people mean when they talk about network blind spots?  And are these really that important?  The answer to the second question is overwhelmingly yes.
The ABCs of Network Visibility
August 25, 2016 | By Yong Zhou
Background Coming into the summer heat of August, one of the hottest topics circling the security world is The Shadow Brokers and their release of seemingly top-secret computer code suspected to be used by the National Security…
ATI Seal
August 23, 2016 | By ATI Blog Team
Authors: Jarrod Johnson and Wei Gao
Ixia's Application and Threat Intelligence (ATI) Research Center is the nerve center for content generation across multiple business units. We provide the threat intelligence that powers…
ATI Seal
August 19, 2016 | By Chuck McAuley
With Defcon and Blackhat two weeks in the rearview mirror, I have finally caught up with the work I didn’t do while in Vegas. Looking back, one presentation that really stood out as deserving more attention was Lucas Lundgren’s…
ATI Seal
August 16, 2016 | By Sashi Jeyaretnam
HTTP/2 was designed for better end-user experience by making it is faster and more secure. HTTP/2 reduces latency by enabling request and response multiplexing, minimizing protocol overhead via compressing header fields, and adding support for request prioritization and server push. Also,…
August 16, 2016 | By Sashi Jeyaretnam
HTTP/2 is here! According the Web Technology Surveys over 9% of websites have already made the transition, and it includes some of the most popular sites including Google, Facebook, Wikipedia, Instagram, and Alibaba.  HTTP…
August 12, 2016 | By Linda Beaton
Recently, a slew of companies announced bug bounty programs. That’s great that businesses are taking more responsibility for proactively catching problems that can turn into security vulnerabilities. It’s also a great reminder of the “seller beware” counsel. But do bug bounty programs go deep…
August 12, 2016 | By Mihai Puchiu
Automation makes work more efficient. This translates to testing as well. The highest efficiency occurs when tests are executed automatically, with minimum involvement of a test engineer. Although it’s fun to edit test configurations from Ixia’s
August 12, 2016 | By Jeff Harris
Here we are again.  The personal data of up to 3.7 million individuals is now at risk following a cyberattack on US healthcare insurance provider Banner Health. While full details of the mode of attack and the data that has actually been compromised are…
August 9, 2016 | By Keith Bromley
In this blog, I want to explain what visibility architectures are. First of all, what do we even mean by visibility? Visibility is defined by Webster as the “capability of being readily noticed” or “the degree of clearness”.  For network or application visibility, we are talking about removing…
Visibility Architectures:  The ABCs of Network Visibility
August 8, 2016 | By A. Joseph Dupre III
Traditional and next-generation workloads are transitioning to the cloud at an increasing pace. In addition to the economy of scale that is afforded by the virtual infrastructure, there are traditional security concerns associated with identified vulnerabilities in these workloads and the…