If you need any more proof that the network detection and response (NDR) market is booming, look no further than Gartner’s Review and Ratings, which contains reviews for 20 NDR solutions—as well as information on 18 additional NDRs that haven’t been reviewed.Read more
Ransomware continues to be a major cybersecurity threat for businesses of all sizes across the globe. In 2021, a Sophos study revealed that the average cost of ransomware doubled to $1.85 million—adding to the disappointing discovery only about 8% of businesses that pay a ransom actually get their data back. Recently, the US CISA, FBI, and NSA published a joint Cybersecurity Advisory (together with the UK and Australian cybersecurity agencies) on ransomware trends, techniques, and mitigations adding to the urgency that companies strengthen their security posture against ransomware.Read more
Last month, we were faced with another attack. It’s funny, isn’t it? The only thing that we are assured of these days is that an attack will happen. To be truthful, last month’s logjam vulnerability was a bit more of an issue than most. I was talking about the attack with one of our larger European customers and they supported a position that I have had since I started with Plixer over 15 years ago. In a critical situation, similar to the log4j attack, leveraging contextual metadata is the most efficient way to contain the incident. Here are a few reasons why metadata is the better choice for your visibility needs.Read more
XDR stands for eXtended Detection and Response. What it is depends on who is explaining it. XDR evolved very quickly from Network Detection and Response (NDR) and Endpoint Detection and Response (EDR) because everyone realized that neither alone could solve the enterprise security problem. In loose terms, XDR is similar to the old concept of a layered security strategy.Read more
Earlier this month, a vulnerability in the Apache Log4j logging framework was disclosed. The zero-day vulnerability was published by Alibaba Cloud’s security team as was called Log4Shell (CVE-2021-44228).
To protect business-critical applications and prevent remote code execution, which could give unfettered access to the hacker, businesses need to understand how to protect themselves from such attacks while patching vulnerable systems.Read more