All

Using MITRE ATT&CK® with the Plixer Platform

Any security analyst will tell you that the most challenging part of the job is knowing what to respond to. There is no shortage...

River Delta

Adding Endpoint Analytics to Flow Data

When we think about the world of Network Flow data, we usually think within Layers 3, 4, and 5. Typically IP addresses are as...

padlock securing a door

The importance of encrypted traffic analytics to your network security posture

Data security is a critical aspect of any organization’s IT infrastructure. With the explosion of cyber threats, it has become ever-important to ensure that...

Night Sky

3 Factors When Considering a Network Detection and Response Platform

It’s a cliche at this point to discuss the “ever-evolving threat landscape”. Cliché or not, the fact remains that attackers continue to become more...

View of space beyond treelined

3 cybersecurity trends you should pay attention to

How prepared for an attack are you? The most recent Microsoft Defence Report found volume of password attacks has risen to an estimated 921...

stephen kraakmo uAzUg tMCo unsplash

DNS filtering in the Plixer platform

At its core, DNS is what makes the internet work. Without it, everyone would need to remember the IP address of every website they...

tobias carlsson dZuNBgA unsplash

Exploring NPMD use cases with the Plixer Platform

When it comes to NPMD, there are an incredibly large number of use cases the Plixer Platform can solve. During my time as a...

julian hochgesang yvquoxk unsplash

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to...

annie spratt AFBSkibuk unsplash

How to map MITRE ATT&CK® with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected.  Traditional attacks use straightforward methods, such as weaponizing emails...