All
ransomware attacks impact more than their target victims

Ransomware attacks impact more than their target victim

Last week Kronos (now Ultimate Kronos Group (UKG)) announced that they were hit by a ransomware attack that is likely to keep their system...

jeffl

Network Detection and Response as an investment: How to calculate the value

This is the final post in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How...

jeffl

Containing a cyberattack: How NDR strengthens your response

This is part 3 in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How to use NDR as a radar...

jeffl

Why network metadata analysis is the best initial action to inform security teams

This is part 2 in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How to...

jeffl

How to use NDR as a radar system for your network

This is the first in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. In the warmer months here in New England, you...

justin scaled

Using flow-based NDR to fight ransomware

Ransomware is everywhere and cybercriminals are increasingly more antagonistic, demanding ever increasing ransom payments. Palo Alto Networks’ Unit 42 says that payments are up...

georgem

The changing needs of network performance monitoring

Recently, I was asked by one of our long-time customers whether Plixer had abandoned its traditional Network Performance Monitoring & Diagnostics (NPMD) and Network...

theresa

Enterprises face tough, new reality of cybercrime: It’s not if, but when

By 2025, it’s estimated that cybercrime will cost the world $10.5 trillion annually—a figure that includes damage and destruction of data; theft of intellectual...

scottr

Network security: How effective is your security posture?

Network security is described as the implementation of technologies, processes, and protocols designed to safeguard an organization’s communications and information....