interrosec
The Blog

Network Intelligence Insights

Detection techniques, visibility deep-dives, and security engineering from the InterroSec team.

Detection5 min read

Why Prophet Beats SMA for Network Anomaly Detection

Simple moving averages miss daily patterns. Here's why Facebook Prophet is better for detecting anomalies in network flow data.

Compliance6 min read

PCI DSS Network Segmentation: What Auditors Actually Want

PCI DSS segmentation requirements are often misunderstood. Here's what auditors actually look for — and how to demonstrate it.

Detection5 min read

Understanding Network Traffic Baselines: Beyond Simple Averages

A meaningful network baseline captures rhythm, trend, and seasonality — not just the average of recent samples.

Cloud5 min read

Hybrid Cloud Network Monitoring: On-Prem Meets Azure

When your workloads span on-premises infrastructure and Azure, network monitoring requires a unified approach to both environments.

Detection5 min read

When the Spike Doesn't Come: Detecting Absence Anomalies

Missing traffic can be as suspicious as unexpected traffic. Here's how to detect anomalies in what isn't happening on your network.

Segmentation5 min read

Microsegmentation Planning Without the Guesswork

Microsegmentation projects fail when they're designed on assumptions instead of observed communication data. Flow data changes that.

Detection5 min read

Solving Alert Fatigue with Auto-Resolving Anomalies

Persistent false-positive alerts train analysts to ignore them. Auto-resolution closes the loop and keeps signal-to-noise ratios high.

Cloud5 min read

Auto-Discovering Cloud Topology from Flow Data

Cloud environments change faster than documentation can keep up. Flow-driven topology discovery shows you what's actually there.

Detection5 min read

Predictive vs Reactive NDR: Why Forecasting Matters

Reactive NDR catches threats after the fact. Predictive NDR changes the time equation — and that changes outcomes.

Segmentation5 min read

Zero Trust Starts with Visibility

Zero trust architecture requires knowing what's on your network and what it's doing. That knowledge comes from visibility, not policy.

Visibility5 min read

Agentless vs Agent-Based: The Flow Advantage

Deploying agents on every endpoint isn't the only path to network visibility. Here's why flow-based monitoring is often the better choice.

Compliance6 min read

Using Flow Data for HIPAA Network Compliance

HIPAA's network security requirements are less prescriptive than PCI DSS, but they demand the same underlying capability: knowing where PHI travels.

Visibility5 min read

NetFlow, IPFIX, and sFlow: A Practical Guide

Three flow protocols dominate enterprise network telemetry. Here's what each one does, when to use it, and how to configure it.

Segmentation6 min read

From Flat Network to Segmented: A Practical Roadmap

Moving from a flat network to meaningful segmentation doesn't require a forklift upgrade. Here's the practical path.

Visibility5 min read

Mapping Application Dependencies in Hybrid Cloud

Application dependency maps built from flow data show the actual communication graph — not what documentation says it should be.

Segmentation5 min read

Why You Need Policy Visualization Before Enforcement

Enforcing a segmentation policy without visualizing it first is how you break production at 2 AM. Here's a better approach.

Visibility5 min read

East-West Traffic: The Blind Spot in Your Network

Most security tools focus on what enters and leaves the network. The lateral movement that leads to breaches happens inside it.

Cloud5 min read

Making Sense of Azure NSG Flow Logs

NSG Flow Logs are Azure's primary network telemetry source, but they require careful setup and interpretation to be useful.

Visibility7 min read

Flow-Based Network Visibility: The Complete Guide

Everything you need to know about flow-based network monitoring: how it works, what it covers, and how to deploy it effectively.

Compliance6 min read

Audit-Ready Network Documentation in Minutes, Not Months

Scrambling to produce network documentation at audit time is avoidable. Here's how continuous flow monitoring changes the preparation equation.