All Security Operations
Image of a key made from digital data, representing unauthorized access gained from a supply chain attack

Supply Chain Fallout: What the Salesloft Drift Attack Reveals About Third-Party Risk—and How Plixer One Helps

The recent breach of the Salesloft Drift application highlights a troubling truth: even organizations with strong internal security can be compromised through trusted external...

A set of scales in a digital environment, representing enterprise risk management

Enterprise Risk Management: A Comprehensive Guide

Enterprise risk management (ERM) is a strategic approach meant to help businesses identify, assess, and respond to these risks in a systematic way. It...

Representation of user behavior analytics: a conceptual image of data and calculating standard deviation

How User Behavior Analytics (UBA) Fits Into the Security Stack

There are many ways for attackers to move quietly through the network, using stolen credentials and subtle behavioral shifts to slip past firewalls and...

Chain made of digital data, representing the supply chain

Understanding Supply Chain Attacks: Methods, Risks, and Defenses

Supply chain attacks have become a greater risk as businesses grow more interconnected. Rather than directly targeting an organization, attackers gain access by exploiting...

Representation of lateral movement: attack spreads through a network from a central point

Understanding Lateral Movement: How Attackers Navigate Your Infrastructure

Lateral movement refers to the techniques attackers use to move through a network after gaining initial access. Instead of attacking a single machine, they...

A picture of a cartoon courthouse looking dark and gloomy surrounded by locks meant to depict a cyber attack.

Navigating the Rising Tide of Stealth Cyber Threats: A 2024 Perspective

As we navigate through 2024, the cybersecurity landscape is increasingly dominated by stealth and sophistication. The recent CrowdStrike Global Threat Report highlights a dramatic...

Plixer One dashboard showing alarms related to user/entity behavior

Enhancing Security with Behavior Analytics   

User and Entity Behavior Analytics (UEBA) provides the critical insights needed to identify these hidden dangers by monitoring behavioral patterns across users and entities,...

abstract background with coding overlayed ontop of an AI person

ML in the Age of AI – Where ML Fits in Network Security in 2024 and Beyond 

Author: Ryan Mellmer, Plixer Software Engineer The world is currently in an AI (Artificial Intelligence) revolution. AI is everywhere today; in the news, in...

Open lock on top of a circuit board, representing a data breach

Preventing Data Breaches in Healthcare: How to Gain Control and Efficiency with Ironclad NDR and NPMP from Plixer

Author: Stephanie Kille, Customer Success Manager, Plixer Recent years have seen a disturbing trend of healthcare data breaches, with cybercriminals targeting organizations across the...

gloomy forest scene

Unmasking the Covert Threat: How Plixer Shields Networks from the Sophisticated Agent Raccoon

The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why...