All Security Operations
theresa

Enterprises face tough, new reality of cybercrime: It’s not if, but when

By 2025, it’s estimated that cybercrime will cost the world $10.5 trillion annually—a figure that includes damage and destruction of data; theft of intellectual...

scottr

Network security: How effective is your security posture?

Network security is described as the implementation of technologies, processes, and protocols designed to safeguard an organization’s communications and information....

scottr

Detect abnormal lateral network traffic using machine learning and NetFlow

In a previous blog I introduced you to the malware detection capabilities of Plixer’s intelligence product. I would like to circle back to some...

joanna

Malicious links and how to find them

It can happen to anyone, even the most seasoned of network security personnel. You can be searching for something on Google, see a seemingly...

dylan

Tuning DDoS and DRDoS flow analytics to your environment

As more and more devices are added to the internet, a larger swath of insecurity comes with them. Botnets and compromised devices are the...

scott

Malware detection using machine learning and NetFlow

Last year Plixer released version 19 of Scrutinizer, and with it came the introduction of Plixer Security Intelligence, our machine learning appliance. The ML...

dylan

Finding threats with host index

Imagine someone walks up to your desk and asks a very simple question: has this IP address been seen on our network? This could...

stephen

Network Detection and Response (NDR): What does it mean?

What is NDR? This blog will focus on the hottest 3-letter acronym of 2020 & 2021—NDR. Network Detection and Response solutions must address an...