All NDR
Map of decoy dog attacks

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have...

Why Other NDR Solutions Are So Expensive

If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure to monitor, ingest, and analyze...

julian hochgesang yvquoxk unsplash

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to...

annie spratt AFBSkibuk unsplash

How to map MITRE ATT&CK® with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected.  Traditional attacks use straightforward methods, such as weaponizing emails...

AdobeStock scaled

What visibility flow data offer

Network and Security administrators have several monitoring protocols available to help provide network insight and security awareness. Today, I’d like to talk about why flow...

jimmy conover AeuYpLzwmC unsplash

Why IT SecOps analysts need more than endpoint agents and system logs

Endpoint agents and logs often play an important role in securing your organization. That said, despite the investment of millions into endpoint agents, IDS/IPS,...

clark van der beken xApCDIiD unsplash

3 ways single platform cybersecurity vendors are failing you

We’ve seen the best-of-breed or single-vendor platform debate unfold for many years. On one hand, you have niche solutions providing a focused approach to...

Preparing for the next threat

It’s safe to say organizations have had their fair share of cyber attacks this past year—from threats discovered early last year with VMware (CVE-2021-21985 and CVE-2021-21972), which...

When EDR isn’t enough, be glad you have NDR

When tools that were created to help security teams simulate attacks are used by the attackers, you know there’s a problem. But that’s exactly what’s happened...

3 cybersecurity trends to watch

Businesses are seeing a 50% increase in cyberattacks per week. That’s according to a report from Check Point Research, where companies reported a bump in...