At its core, DNS is what makes the internet work. Without it, everyone would need to remember the IP address of every website they wanted to visit, and content delivery networks would work because their anycast approach to IP would prevent dynamic association when a request is made to the IP address. Put simply, DNS makes it easy and affordable for websites to exist without those sites needing to own their own IP address. However, this easy and affordable approach is also what makes DNS a potential security vulnerability for organizations.Read more
When it comes to NPMD, there are an incredibly large number of use cases the Plixer Platform can solve. During my time as a Sales Engineer, the most common use case I encounter is bandwidth monitoring or a more generic network troubleshooting. However, there are plenty of other use cases that can help most organizations today. Take Capacity planning as an example.Read more
If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to carry out an attack. It’s typically along the lines of gaining entry, performing recon, moving to vulnerable targets, doing bad things, and exfiltrating data.Read more
Sophisticated attacks continue to grow and breach organizational defenses and they do so without being detected.
Traditional attacks use straightforward methods, such as weaponizing emails in phishing attacks, which direct the victim to a bad domain where malicious actors can compromise or steal important information. If security teams in the organization can detect and identify such attacks early on, it will help the security team work efficiently and determine whether the attack is a nuisance that can be removed or one that’s debilitating and costly.Read more
You and I both know that AI is all the buzz today. Artificial Intelligence (AI) is quickly fueling the evolution of today’s high-octane environment.
Being able to effectively monitor and manage today’s cyber threats is a monumental task. Every day I talk to people whose pain points are similar. They don’t have the budget or resources needed to effectively deal with this onslaught of activity that their team is facing. It makes sense that AI/ML in threat intelligence is what today’s SecOps teams are leveraging to deal with zero days and other unknown APTs in their network.
So are your enemies . . . . . . .Read more