If you need any more proof that the network detection and response (NDR) market is booming, look no further than Gartner’s Review and Ratings, which contains reviews for 20 NDR solutions—as well as information on 18 additional NDRs that haven’t been reviewed.
Read moreBlog
How Plixer can help address CISA ransomware recommendations
Ransomware continues to be a major cybersecurity threat for businesses of all sizes across the globe. In 2021, a Sophos study revealed that the average cost of ransomware doubled to $1.85 million—adding to the disappointing discovery only about 8% of businesses that pay a ransom actually get their data back. Recently, the US CISA, FBI, and NSA published a joint Cybersecurity Advisory (together with the UK and Australian cybersecurity agencies) on ransomware trends, techniques, and mitigations adding to the urgency that companies strengthen their security posture against ransomware.
Read moreThe devil is in the details: A deeper look into forensics with metadata.
Last month, we were faced with another attack. It’s funny, isn’t it? The only thing that we are assured of these days is that an attack will happen. To be truthful, last month’s logjam vulnerability was a bit more of an issue than most. I was talking about the attack with one of our larger European customers and they supported a position that I have had since I started with Plixer over 15 years ago. In a critical situation, similar to the log4j attack, leveraging contextual metadata is the most efficient way to contain the incident. Here are a few reasons why metadata is the better choice for your visibility needs.
Read moreXDR: A better mousetrap or just more hype?
XDR stands for eXtended Detection and Response. What it is depends on who is explaining it. XDR evolved very quickly from Network Detection and Response (NDR) and Endpoint Detection and Response (EDR) because everyone realized that neither alone could solve the enterprise security problem. In loose terms, XDR is similar to the old concept of a layered security strategy.
Read moreProtect your network from Log4j and future vulnerabilities
Earlier this month, a vulnerability in the Apache Log4j logging framework was disclosed. The zero-day vulnerability was published by Alibaba Cloud’s security team as was called Log4Shell (CVE-2021-44228).
To protect business-critical applications and prevent remote code execution, which could give unfettered access to the hacker, businesses need to understand how to protect themselves from such attacks while patching vulnerable systems.
Read more