All Security Operations
scottr

Detect abnormal lateral network traffic using machine learning and NetFlow

In a previous blog I introduced you to the malware detection capabilities of Plixer’s intelligence product. I would like to circle back to some...

joanna

Malicious links and how to find them

It can happen to anyone, even the most seasoned of network security personnel. You can be searching for something on Google, see a seemingly...

dylan

Tuning DDoS and DRDoS flow analytics to your environment

As more and more devices are added to the internet, a larger swath of insecurity comes with them. Botnets and compromised devices are the...

scott

Malware detection using machine learning and NetFlow

Last year Plixer released version 19 of Scrutinizer, and with it came the introduction of Plixer Security Intelligence, our machine learning appliance. The ML...

dylan

Finding threats with host index

Imagine someone walks up to your desk and asks a very simple question: has this IP address been seen on our network? This could...

stephen

Network Detection and Response (NDR): What does it mean?

What is NDR? This blog will focus on the hottest 3-letter acronym of 2020 & 2021—NDR. Network Detection and Response solutions must address an...

Why and how to export a violator list for DDoS mitigation

The need to detect and mitigate denial-of-service attacks is nothing new to network and security administrators. DoS attacks on enterprise networks have been occurring...

dylan

Should you be monitoring ping?

Ping is one of those protocols that no one thinks about until it isn’t working and you’re trying to quickly troubleshoot connectivity between devices....