
5 ways of verifying security risks and avoiding false positives
I think I can safely assume that everyone knows the cautionary tale of the boy who cried wolf. If you don’t, the moral is the
I think I can safely assume that everyone knows the cautionary tale of the boy who cried wolf. If you don’t, the moral is the
As enterprises adjust to the new normal and remote work, they are bracing for potential attacks resulting from employee carelessness. Bad habits, such as leaving
Even though most of us have looked at a calendar recently and thought, “I could have sworn we were in May, not October,” you can’t
I was recently able to explore the Splunk software development kit with a customer. This helped me to implement another way to get username attribution
A few years ago, we added a behavioral algorithm to Plixer Scrutinizer that looked at all the flow data that was collected and determined if
Today we are going to talk about Plixer’s new Flow Analytics algorithm, Reverse SSH Shell, which has been included in the latest Plixer Scrutinizer update.
What is STIX/TAXII? STIX stands for Structured Threat Information Expression, which is an open-source language and serialization format used in sharing threat intelligence. Think of
I can’t tell you how many calls I’ve been on where the NetOps and SecOps teams really don’t know what the other is doing. Sadly,
Many ISPs filter bogon connections because bogon IP addresses have no legitimate use. If you find a bogon or bogus IP address in your firewall
A common tactic for bad actors to get a foothold into the network is to leverage IP spoofing to either: Gain access to a network
68 Main St Ste 4
Kennebunk, ME 04043
© 1999 – 2023 Copyright Plixer, LLC. All rights reserved. Terms of Use | Privacy Policy