All
bob

Are SMS Cybersecurity Attacks About To Explode?

I recently joined Plixer (August 2016) and as part of my onboarding process, received a new cell phone. Over the last two months, on...

sd wan

SD WAN Problems with Visibility

We have blogged on topics surrounding the SD WAN industry a few times. In one post, we provided a list of SD WAN vendors and...

Network Problem Solving Use Cases

In the last year I’ve been fortunate enough to be a Field Engineer for a company that I love. I’ve had the incredible opportunity...

What you need to know about 23 NYCRR 500

Near the end of last year, Financial Services Superintendent Maria T. Vullo announced that the New York State Department of Financial Services (DFS) had...

Mirai DDoS Botnet Powers Up and is Out of Control

In 2017, DDoS will be the largest cyber threat facing corporate security teams. The reason is largely due to two factors. First is the...

joanna

Popular Apps: Your Child’s or Teen’s Data Privacy

I will admit it—I am a helicopter aunt. As soon as my nieces and nephews got Kindles for Christmas, I was buzzing around trying...

jake

NetFlow Collector Integration

I’ll be the first to admit that my patience starts to wear thin when troubleshooting a problem and having to jump through 10 different...

cyberattacks

Preventing Cyberattacks in 2017

As the new year approaches, it can be difficult to remember all the cyberattacks the world has faced in the past year, let alone...

AdobeStock

TACACS+ Authentication in Scrutinizer

One of the most daunting tasks network administrators face on a day to day basis is ensuring that authorized users can access the network resources they...