Security Operations Posts

A padlock silhouetted against a dark background, surrounded by a spray of white particles, representing password spraying detection.
Security Operations

What Password Spraying Looks Like in Raw Network Telemetry

Password spraying is usually described in terms of failed logins and account lockouts. But before a SIEM rule fires

Read More
Radar scans a digital network, representing flow-based threat hunting
Security Operations

How Flow Data Supports Threat Hunting Without Drowning Analysts

Threat hunting should feel deliberate. You should be able to follow a path, validate a suspicion, and document what

Read More
A hand drawing a playbook on glass, representing network flow data for incident response
Security Operations

Why Flow Data Belongs in Your Incident Response Playbook

When an incident kicks off, the early picture is usually fragmented. Logs and endpoint alerts hint at symptoms and

Read More
Many blue network nodes with one red note to which several connecting lines are attached, representing lateral movement detection
Security Operations

How to Investigate Lateral Movement Using Flow Data

Lateral movement is rarely loud. Once an attacker gains an initial foothold, the next phase often blends into normal

Read More
Image of a key made from digital data, representing unauthorized access gained from a supply chain attack
Security Operations

Supply Chain Fallout: What the Salesloft Drift Attack Reveals About Third-Party Risk—and How Plixer One Helps

The recent breach of the Salesloft Drift application highlights a troubling truth: even organizations with strong internal security can

Read More
A set of scales in a digital environment, representing enterprise risk management
Security Operations

Enterprise Risk Management: A Comprehensive Guide

Enterprise risk management (ERM) is a strategic approach meant to help businesses identify, assess, and respond to these risks

Read More
Representation of user behavior analytics: a conceptual image of data and calculating standard deviation
Security Operations

How User Behavior Analytics (UBA) Fits Into the Security Stack

There are many ways for attackers to move quietly through the network, using stolen credentials and subtle behavioral shifts

Read More
Chain made of digital data, representing the supply chain
Security Operations

Understanding Supply Chain Attacks: Methods, Risks, and Defenses

Supply chain attacks have become a greater risk as businesses grow more interconnected. Rather than directly targeting an organization,

Read More
Representation of lateral movement: attack spreads through a network from a central point
Security Operations

Understanding Lateral Movement: How Attackers Navigate Your Infrastructure

Lateral movement refers to the techniques attackers use to move through a network after gaining initial access. Instead of

Read More
A picture of a cartoon courthouse looking dark and gloomy surrounded by locks meant to depict a cyber attack.
Network Security

Navigating the Rising Tide of Stealth Cyber Threats: A 2024 Perspective

As we navigate through 2024, the cybersecurity landscape is increasingly dominated by stealth and sophistication. The recent CrowdStrike Global

Read More