Endpoint security stats you need to know
Endpoint security is crucial for protecting your organization from cyber threats. With the increasing vulnerabilities posed by human actions, it’s essential to have key insights into endpoint behavior.
Endpoint security is crucial for protecting your organization from cyber threats. With the increasing vulnerabilities posed by human actions, it’s essential to have key insights into endpoint behavior.
Network flow data (NetFlow, IPFIX, sFlow, etc.) is telemetry data extracted from your network infrastructure. Network Operations teams frequently tap into this data set to monitor performance.
If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure to monitor, ingest, and analyze traffic for threat activity. Packet analysis is a very popular threat detection method, but it has shortcomings that may not seem obvious at first glance. For starters, deploying packet infrastructure is …
When it comes to NPMD, there are an incredibly large number of use cases the Plixer Platform can solve. During my time as a Sales Engineer, the most common use case I encounter is bandwidth monitoring or a more generic network troubleshooting. However, there are plenty of other use cases that can help most organizations …
Exploring NPMD use cases with the Plixer Platform Read More »
If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to carry out an attack. It’s typically along the lines of gaining entry, performing recon, moving to vulnerable targets, doing bad things, and exfiltrating data.
Sophisticated attacks continue to grow and breach organizational defenses and they do so without being detected. Traditional attacks use straightforward methods, such as weaponizing emails in phishing attacks, which direct the victim to a bad domain where malicious actors can compromise or steal important information. If security teams in the organization can detect and identify such …
You and I both know that AI is all the buzz today. Artificial Intelligence (AI) is quickly fueling the evolution of today’s high-octane environment. Being able to effectively monitor and manage today’s cyber threats is a monumental task. Every day I talk to people whose pain points are similar. They don’t have the budget or …
How cybercriminals are using ML and how to combat it Read More »
Network and Security administrators have several monitoring protocols available to help provide network insight and security awareness. Today, I’d like to talk about why flow technologies like NetFlow should be top of mind in this discussion.
It’s fall here on the east coast of the US and that means a few things. First is that the weather and leaves start changing and the second is that students start going back to school. I live in a college town, so seeing Franklin Street teaming with young minds ready to be molded is …
5 ways university networks need to shift in the post-pandemic world Read More »
Endpoint agents and logs often play an important role in securing your organization. That said, despite the investment of millions into endpoint agents, IDS/IPS, and SEIM, many organizations have still been on the wrong end of a successful cyberattack. Why is this the case?