All Security Operations
gloomy forest scene

Unmasking the Covert Threat: How Plixer Shields Networks from the Sophisticated Agent Raccoon

The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why...

Using MITRE ATT&CK® with the Plixer Platform

Any security analyst will tell you that the most challenging part of the job is knowing what to respond to. There is no shortage...

padlock securing a door

The importance of encrypted traffic analytics to your network security posture

Data security is a critical aspect of any organization’s IT infrastructure. With the explosion of cyber threats, it has become ever-important to ensure that...

View of space beyond treelined

3 cybersecurity trends you should pay attention to

How prepared for an attack are you? The most recent Microsoft Defence Report found volume of password attacks has risen to an estimated 921...

rickj

XDR: A better mousetrap or just more hype?

XDR stands for eXtended Detection and Response. What it is depends on who is explaining it. XDR evolved very quickly from Network Detection and...

logj

Protect your network from Log4j and future vulnerabilities

Earlier this month, a vulnerability in the Apache Log4j logging framework was disclosed. The zero-day vulnerability was published by Alibaba Cloud’s security team as...

ransomware attacks impact more than their target victims

Ransomware attacks impact more than their target victim

Last week Kronos (now Ultimate Kronos Group (UKG)) announced that they were hit by a ransomware attack that is likely to keep their system...

justin scaled

Using flow-based NDR to fight ransomware

Ransomware is everywhere and cybercriminals are increasingly more antagonistic, demanding ever increasing ransom payments. Palo Alto Networks’ Unit 42 says that payments are up...

theresa

Enterprises face tough, new reality of cybercrime: It’s not if, but when

By 2025, it’s estimated that cybercrime will cost the world $10.5 trillion annually—a figure that includes damage and destruction of data; theft of intellectual...

scottr

Network security: How effective is your security posture?

Network security is described as the implementation of technologies, processes, and protocols designed to safeguard an organization’s communications and information....