Blog
Search blog posts
Choose a Category

How to map MITRE ATT&CK with Plixer NDR
Sophisticated attacks continue to grow and breach organizational defenses and they do so without being detected. Traditional attacks use straightforward methods, such as weaponizing emails in phishing attacks, which direct the victim to a bad domain where malicious actors can compromise or steal important information. If security teams in the organization

How cybercriminals are using ML and how to combat it
You and I both know that AI is all the buzz today. Artificial Intelligence (AI) is quickly fueling the evolution of today’s high-octane environment. Being able to effectively monitor and manage today’s cyber threats is a monumental task. Every day I talk to people whose pain points are similar. They

What visibility flow data offer
Network and Security administrators have several monitoring protocols available to help provide network insight and security awareness. Today, I’d like to talk about why flow technologies like NetFlow should be top of mind in this discussion.

5 ways university networks need to shift in the post-pandemic world
It’s fall here on the east coast of the US and that means a few things. First is that the weather and leaves start changing and the second is that students start going back to school. I live in a college town, so seeing Franklin Street teaming with young minds

Why IT SecOps analysts need more than endpoint agents and system logs
Endpoint agents and logs often play an important role in securing your organization. That said, despite the investment of millions into endpoint agents, IDS/IPS, and SEIM, many organizations have still been on the wrong end of a successful cyberattack. Why is this the case?

3 ways single platform cybersecurity vendors are failing you
We’ve seen the best-of-breed or single-vendor platform debate unfold for many years. On one hand, you have niche solutions providing a focused approach to cybersecurity. On the other, you have one platform that provides interoperability.