How to protect your organization against email spoofing
We’ve all come across spoofed emails at some point, and they are a real threat to the security and safety of our organizations and...
We’ve all come across spoofed emails at some point, and they are a real threat to the security and safety of our organizations and...
This month I was working with a customer who was having a hard time understanding what AP MAC was being reported by Scrutinizer when...
Last year our CEO asked if I would be interested in starting a Girls Who Code club in our local school system. He had...
How do you maintain an environment that is both open and secure? Many professionals who work in education cybersecurity have to answer this question,...
The first blog in this series discussed the importance of including information security in the strategic planning of any educational institution. In today’s blog...
Near the end of last year, Financial Services Superintendent Maria T. Vullo announced that the New York State Department of Financial Services (DFS) had...
For the last few decades, security teams have taken a “point product” and best-of-breed approach to securing their environments. Although historically this approach has...
Back in April of this year, the Swift international money transfer network which connects 11,000 global banks in over 200 countries was used to...
The Plixer team recently had the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim, California. Over the course of the show we...
I was recently given the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim California as part of the Plixer team. For those...
Looking for documentation? Visit our documentation site