All insider threats
A crowd of figures in a blue digital space. One is highlighted red, representing insider threat detection

Insider Threat Detection: How to Identify and Mitigate Internal Cyber Risks

Insider threat detection has become one of the most critical aspects of modern cybersecurity. Unlike external attacks, which originate from outside an organization, insider threats...

elgin

How human negligence affects network security

As enterprises adjust to the new normal and remote work, they are bracing for potential attacks resulting from employee carelessness. Bad habits, such as...

jake

Forensic investigation of endpoints using NetFlow

This blog will go over how to use some of the features in Plixer Scrutinizer v19.0, such as the host index and IP groups...

insider threats employees

How to Mitigate Insider Threats with Network Traffic Analytics

According to a recent Ponemon Institute report, the cost of insider-related breaches has escalated to over $8.7 million. What’s even more concerning is that...