Last week Kronos (now Ultimate Kronos Group (UKG)) announced that they were hit by a ransomware attack that is likely to keep their system offline for weeks. As a major human resources management company, they provide services like payroll, timekeeping, etc. to other companies. Because so many companies rely on Kronos’s services, they are feeling the effects of this attack as well. So, what does this show us about the danger and damages of ransomware?
Read moreBlog
Network Detection and Response as an investment: How to calculate the value
This is the final post in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How to use NDR as a radar system for your network, part 2, Why network metadata analysis is the best initial action to inform security teams, and part 3, Containing a cyberattack: How NDR strengthens your response.
In this blog series, I’ve discussed how Network Detection and Response (NDR) solutions play a critical role in the fight against cyberattacks through detection, analysis, and containment of threats within your network. Security Operations teams rely on tools like NDR to identify and isolate nefarious behavior. Acting as a radar system for your network, NDR systems provide early detection of threats and work with your existing infrastructure to isolate and neutralize them. Still, with the increasing demand on your budget, it can be challenging to figure out how to pay for another security tool.
Read moreContaining a cyberattack: How NDR strengthens your response
This is part 3 in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How to use NDR as a radar system for your network and part 2, Why network metadata analysis is the best initial action to inform security teams.
In this blog series, we’ve been talking about how to use NDR to stop cyberattacks. But no matter what tools you use to detect nefarious behavior in your network, the end goal is always the same: to stop it quickly and comprehensively.
Read moreWhy network metadata analysis is the best initial action to inform security teams
This is part 2 in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How to use NDR as a radar system for your network.
In my last blog, I wrote about how the metadata collected by the multitude of behavior sensors already deployed across your network can provide the best early warning system you can find. Much like a radar system for on-water navigation, your network metadata is the fastest way to gain a sense of the potential dangers around you. But can it really provide the context you need to understand your network traffic comprehensively?
Read moreHow to use NDR as a radar system for your network
This is the first in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm.
In the warmer months here in New England, you can often find me on my small boat cruising around Boston harbor and the outer islands. As a safety-focused boater, I rely on my radar system to detect the many objects around me—everything from other watercraft, buoys, landmasses, even uncharted hazards (the nautical version of zero-day threats). My radar is my best early detection system, alerting me to all possible threats.
Read more