Blog

Ixia’s Application and Threat Intelligence (ATI) Research Center continues to lead in researching, understanding, and helping to protect customers from the newest, most dangerous malware.
ATI Seal
Topic
July 21, 2016 | By Amritam Putatunda
Let’s Discuss the Elephant in the Room –Zero Days Quite often during my customer meetings or presentations, I am asked if we have pre-packaged test cases that can generate zero-day vulnerability. Providing the correct answer can be tricky sometimes as a direct response puts doubts…
July 15, 2016 | By Jeff Harris
Fast food chain Wendy’s has fallen victim to a sustained cyberattack, affecting over 1,000 of its franchised restaurants across the US and breaching customers’ payment card data.  Malware was…
July 13, 2016 | By Garett Montgomery
To keep our Application and Threat Intelligence (ATI) customers current, Ixia’s ATI Research Center marches to the lively tempo of new applications and vulnerabilities, and continually evolving attacks. The ATI-2016-14 release includes some description improvements in several of our Strike Lists,…
ATI Seal
July 11, 2016 | By Jason Landry
To manage passwords today, you have to have an amazing memory. We are taught that passwords must be hard for someone to guess. Then we can’t remember them. So, we write them down, use a password manager, or click the forgot password link when all else fails. All of these create password friction,…
July 7, 2016 | By Amritam Putatunda
Recently, while I was getting ready for my weekend, I got a call from one of my friends who is also an Ixia customer. He had an urgent requirement for understanding his product’s resiliency to a very recent publicized attack where hackers gained access to users’ systems. He was wondering when he…
BreakingPoint
July 7, 2016 | By Marie Hattar
One of the big problems with network security is that it is not a fair fight.  IT teams work around the clock to securely provision new equipment, deploy applications, update systems, patch software and monitor networks, in order to close off the thousands of potential vulnerabilities that a…
Seeing is understanding
July 5, 2016 | By Lora O'Haver
According to the 2016 Cyberthreat Defense Report (CDR), next generation firewalls are the top-ranked security acquisition planned in 2016. And it’s no wonder. Even with advanced security appliances implemented…
June 24, 2016 | By Areg Alimian
Every week, we hear about another healthcare enterprise network being hacked. Cybercriminals have found a lucrative business in stealing patient information. According to the FBI, electronic health records often go for approximately $50 per record on the cyber market. Some experts estimate that…
June 24, 2016 | By Keith Bromley
A common dilemma for IT is how can you get more done for less money? Budgets only go so far. However, internal customer, external customer, and executive needs always seem to go far beyond the existing budget. And budget increases are rare. In fact, research shows that many…
June 23, 2016 | By Roark Pollock
How do you find a needle in a haystack?  In MythBusters Episode 23, Jamie and Adam each ended up destroying the hay in order to find the needle.  But this is not an option for network and security administrators. Monitoring and securing modern…
The ABCs of Network Visibility