All Posts

A hand drawing a playbook on glass, representing network flow data for incident response
Security Operations

Why Flow Data Belongs in Your Incident Response Playbook

When an incident kicks off, the early picture is usually fragmented. Logs and endpoint alerts hint at symptoms and

Read More
Image of a key made from digital data, representing unauthorized access gained from a supply chain attack
Security Operations

Supply Chain Fallout: What the Salesloft Drift Attack Reveals About Third-Party Risk—and How Plixer One Helps

The recent breach of the Salesloft Drift application highlights a troubling truth: even organizations with strong internal security can

Read More
Map of decoy dog attacks
DNS

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about

Read More
NDR

Why Other NDR Solutions Are So Expensive

If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure

Read More
a long exposure photo of a highway at night
NDR

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence

Read More
annie spratt AFBSkibuk unsplash
NDR

How to map MITRE ATT&CK® with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected.  Traditional attacks use straightforward

Read More
AdobeStock scaled
Netflow

What visibility flow data offer

Network and Security administrators have several monitoring protocols available to help provide network insight and security awareness. Today, I’d

Read More
jimmy conover AeuYpLzwmC unsplash
NDR

Why IT SecOps analysts need more than endpoint agents and system logs

Endpoint agents and logs often play an important role in securing your organization. That said, despite the investment of

Read More
clark van der beken xApCDIiD unsplash
NDR

3 ways single platform cybersecurity vendors are failing you

We’ve seen the best-of-breed or single-vendor platform debate unfold for many years. On one hand, you have niche solutions

Read More
NDR

Preparing for the next threat

It’s safe to say organizations have had their fair share of cyber attacks this past year—from threats discovered early

Read More