All General

VTech Breach, Hacking Barbies, and Internet of Things Security

Late last month on Black Friday, Hong Kong-based toymaker VTech suffered a data breach.  Sure, we can just dump it into the ever-expanding list...

Host Reputation and Domain Reputation

It’s becoming more and more evident that an effective cyber threat incident response system requires the implementation and fine tuning of a variety of...

Detecting Point of Sale Credit Card Theft

The complexities involved with detecting Point of Sale credit card theft has to consider numerous tactics. It also requires an understanding that the behavior...

Network Forensic Analysis

When an incident or threat occurs on our networks today one of the more plaguing questions that comes up is “How can I leverage...

How to deploy a Flowpro Virtual Appliance

Today I want to talk about how to deploy a Flowpro Virtual Appliance. With the Flowpro Virtual Appliance, you can get that visibility into...

Protect Against Cyber-Attacks

According to a recently released report by Standard and Poor, lenders could have their credit rating lowered if they fail to protect themselves from...

Elasticsearch NetFlow Integration

UPDATE: You can download our Kibana integration for Scrutinizer here: https://files.plixer.com/resources/configs/scrutinizer-elk.zip Our support team recently received a request for Elasticsearch NetFlow Integration. For those...

Splunk NetFlow Integration

We took some time recently to get our Splunk NetFlow integration working. Apparently, there are a few customers who are looking to get from...

Lax Companies Now Legally Liable for Credit Card Theft

For too long, some companies have shirked their responsibility to protect their customer’s personal information. Furthermore, it is believed that these companies simply gave...

Multi-layered security plan

You already understand the importance of having a multi-layered security plan if you read anything about cybersecurity.  We often talk about it on our blogs, too,...