All Network Security
Cloud network security: a representation of the cloud in a digital space

Cloud Network Security Challenges and How to Solve Them

As more businesses have migrated to the cloud, the question of how to protect digital assets in these dynamic, distributed environments has become critical....

A magnifying glass reveals a fingerprint on a digital surface, representing Indicators of Compromise

What Are Indicators of Compromise? A 2025 Guide for Cybersecurity Teams

For security teams, early detection is the difference between a minor incident and a full-scale breach. That’s where Indicators of Compromise (IOCs) come into...

A crowd of figures in a blue digital space. One is highlighted red, representing insider threat detection

Insider Threat Detection: How to Identify and Mitigate Internal Cyber Risks

Insider threat detection has become one of the most critical aspects of modern cybersecurity. Unlike external attacks, which originate from outside an organization, insider threats...

Harrods, a retailer based in the UK

Securing Retail at Scale: Lessons from the Harrods Cyberattack

Author:  Adam Boeckmann | May 2025 Recent attacks on major UK retailers, including Harrods, M&S, and Co-op, have highlighted a critical reality: even iconic brands...

A hand stopping a falling line of dominos, representing resilience

Strengthening ICT Resilience: How Plixer Supports DORA Compliance Through Network Observability 

Author:  Adam Boeckmann | April 2025 As financial institutions across the EU prepare to meet the requirements of the Digital Operational Resilience Act (DORA), one...

A representation of cyber threat intelligence: chess pieces on a map of interconnected nodes

Cyber Threat Intelligence (CTI): From Reactive to Proactive Security

As attackers grow more sophisticated and persistent, organizations are shifting from reactive defense to proactive strategy. That’s where cyber threat intelligence (CTI) comes in. ...

A picture of a cartoon courthouse looking dark and gloomy surrounded by locks meant to depict a cyber attack.

Navigating the Rising Tide of Stealth Cyber Threats: A 2024 Perspective

As we navigate through 2024, the cybersecurity landscape is increasingly dominated by stealth and sophistication. The recent CrowdStrike Global Threat Report highlights a dramatic...

abstract background with coding overlayed ontop of an AI person

ML in the Age of AI – Where ML Fits in Network Security in 2024 and Beyond 

Author: Ryan Mellmer, Plixer Software Engineer The world is currently in an AI (Artificial Intelligence) revolution. AI is everywhere today; in the news, in...

The word malware on a monitor emphasized in a magnifying glass surrounded by code.

Prevent Catastrophic Cyber Attacks: Lessons from 600,000 Routers Compromised by Mystery Malware 

Authors: Stephanie Kille​, Customer Success Manager and Austin Foster, Customer Success Manager Working in cybersecurity we have all seen our fair share of cyber...

Open lock on top of a circuit board, representing a data breach

Preventing Data Breaches in Healthcare: How to Gain Control and Efficiency with Ironclad NDR and NPMP from Plixer

Author: Stephanie Kille, Customer Success Manager, Plixer Recent years have seen a disturbing trend of healthcare data breaches, with cybercriminals targeting organizations across the...