All
A crowd of figures in a blue digital space. One is highlighted red, representing insider threat detection

Insider Threat Detection: How to Identify and Mitigate Internal Cyber Risks

Insider threat detection has become one of the most critical aspects of modern cybersecurity. Unlike external attacks, which originate from outside an organization, insider threats...

Harrods, a retailer based in the UK

Securing Retail at Scale: Lessons from the Harrods Cyberattack

Author:  Adam Boeckmann | May 2025 Recent attacks on major UK retailers, including Harrods, M&S, and Co-op, have highlighted a critical reality: even iconic brands...

Chain made of digital data, representing the supply chain

Understanding Supply Chain Attacks: Methods, Risks, and Defenses

Supply chain attacks have become a greater risk as businesses grow more interconnected. Rather than directly targeting an organization, attackers gain access by exploiting...

A hand stopping a falling line of dominos, representing resilience

Strengthening ICT Resilience: How Plixer Supports DORA Compliance Through Network Observability 

Author:  Adam Boeckmann | April 2025 As financial institutions across the EU prepare to meet the requirements of the Digital Operational Resilience Act (DORA), one...

Digital hourglass with data falling, representing application performance metrics

Application Performance Metrics: Best Practices and Insights

Application performance has a large impact on the efficiency and success of an organization. Users expect fast, seamless, and reliable experiences, and even a...

A representation of cyber threat intelligence: chess pieces on a map of interconnected nodes

Cyber Threat Intelligence (CTI): From Reactive to Proactive Security

As attackers grow more sophisticated and persistent, organizations are shifting from reactive defense to proactive strategy. That’s where cyber threat intelligence (CTI) comes in. ...

Representation of lateral movement: attack spreads through a network from a central point

Understanding Lateral Movement: How Attackers Navigate Your Infrastructure

Lateral movement refers to the techniques attackers use to move through a network after gaining initial access. Instead of attacking a single machine, they...

A representation of network observability: many nodes on a network, which are all interconnected

Understanding Network Observability: A 2025 Guide for NetOps

A trend of this decade is that we’re being flooded with information and data points. Certainly, an overabundance of data is better than an...

A man struggles to push a boulder uphill, representing the cost of an inflexible network.

Opportunity Cost and the Inflexible Network 

At a former job of mine, there was a tool that most of the company used but nobody liked. It was a database, much...

Visualization of data streams traversing a university campus

Three Ways Universities Use Plixer One to Solve Common Network Problems

With thousands of users and connected devices, ensuring network reliability, security, and compliance is a significant challenge for universities. Network observability—the ability to gain...