NDR Posts

Map of decoy dog attacks
DNS

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about

Read More
a coder inspecting a zero day attack leading to a data breach
NDR

The Impact of a Data Breach

Dive into the recent HCA data breach and learn how a zero-day attack can quickly cause damage to your

Read More
Analyst looking for the MOVEit vulnerability to prevent a cyber attack.
NDR

What is the MOVEit Vulnerability and How To Detect It

By now you have probably heard of a vulnerability in MOVEit or its use by the hacking group ClOp.

Read More
A desktop, mobile phone and laptop, representing a variety of endpoint security vulnerabilities
NDR

Endpoint security stats you need to know

Endpoint security is crucial for protecting your organization from cyber threats. With the increasing vulnerabilities posed by human actions,

Read More
NDR

Is NetFlow useful for security analysis?

Network flow data (NetFlow, IPFIX, sFlow, etc.) is telemetry data extracted from your network infrastructure. Network Operations teams frequently

Read More
NDR

Why Other NDR Solutions Are So Expensive

If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure

Read More
Night Sky
NDR

3 Factors When Considering a Network Detection and Response Platform

It’s a cliche at this point to discuss the “ever-evolving threat landscape”. Cliché or not, the fact remains that

Read More
a long exposure photo of a highway at night
NDR

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence

Read More
annie spratt AFBSkibuk unsplash
NDR

How to map MITRE ATT&CK® with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected.  Traditional attacks use straightforward

Read More
AdobeStock
NDR

5 ways university networks need to shift in the post-pandemic world

It’s fall here on the east coast of the US and that means a few things. First is that

Read More