
Using MITRE ATT&CK® with the Plixer Platform
Any security analyst will tell you that the most challenging part of the job is knowing what to respond to. There is no shortage...
Any security analyst will tell you that the most challenging part of the job is knowing what to respond to. There is no shortage...
When we think about the world of Network Flow data, we usually think within Layers 3, 4, and 5. Typically IP addresses are as...
Data security is a critical aspect of any organization’s IT infrastructure. With the explosion of cyber threats, it has become ever-important to ensure that...
It’s a cliche at this point to discuss the “ever-evolving threat landscape”. Cliché or not, the fact remains that attackers continue to become more...
How prepared for an attack are you? The most recent Microsoft Defence Report found volume of password attacks has risen to an estimated 921...
At its core, DNS is what makes the internet work. Without it, everyone would need to remember the IP address of every website they...
When it comes to NPMD, there are an incredibly large number of use cases the Plixer Platform can solve. During my time as a...
If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to...
Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected. Traditional attacks use straightforward methods, such as weaponizing emails...
You and I both know that AI is all the buzz today. Artificial Intelligence (AI) is quickly fueling the evolution of today’s high-octane environment. ...