Carter Foster

julian hochgesang yvquoxk unsplash

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to carry out an attack. It’s typically along the lines of gaining entry, performing recon, moving to vulnerable targets, doing bad things, and exfiltrating data.

annie spratt AFBSkibuk unsplash

How to map MITRE ATT&CK with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses and they do so without being detected.  Traditional attacks use straightforward methods, such as weaponizing emails in phishing attacks, which direct the victim to a bad domain where malicious actors can compromise or steal important information. If security teams in the organization can detect and identify such …

How to map MITRE ATT&CK with Plixer NDR Read More »

AdobeStock scaled

What visibility flow data offer

Network and Security administrators have several monitoring protocols available to help provide network insight and security awareness. Today, I’d like to talk about why flow technologies like NetFlow should be top of mind in this discussion.