All
View of space beyond treelined

3 cybersecurity trends you should pay attention to

How prepared for an attack are you? The most recent Microsoft Defence Report found volume of password attacks has risen to an estimated 921...

stephen kraakmo uAzUg tMCo unsplash

DNS filtering in the Plixer platform

At its core, DNS is what makes the internet work. Without it, everyone would need to remember the IP address of every website they...

tobias carlsson dZuNBgA unsplash

Exploring NPMD use cases with the Plixer Platform

When it comes to NPMD, there are an incredibly large number of use cases the Plixer Platform can solve. During my time as a...

julian hochgesang yvquoxk unsplash

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to...

annie spratt AFBSkibuk unsplash

How to map MITRE ATT&CK® with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected.  Traditional attacks use straightforward methods, such as weaponizing emails...

AdobeStock Editorial Use Only scaled

How cybercriminals are using ML and how to combat it

You and I both know that AI is all the buzz today. Artificial Intelligence (AI) is quickly fueling the evolution of today’s high-octane environment. ...

AdobeStock scaled

What visibility flow data offer

Network and Security administrators have several monitoring protocols available to help provide network insight and security awareness. Today, I’d like to talk about why flow...

AdobeStock

5 ways university networks need to shift in the post-pandemic world

It’s fall here on the east coast of the US and that means a few things. First is that the weather and leaves start...

jimmy conover AeuYpLzwmC unsplash

Why IT SecOps analysts need more than endpoint agents and system logs

Endpoint agents and logs often play an important role in securing your organization. That said, despite the investment of millions into endpoint agents, IDS/IPS,...