All Posts

Random data points coalesce into a single object, representing network observability
Deep Network Observability

Are You Monitoring Your Network or Just Collecting Data? 

Network downtime doesn’t just mean frustrated users, but potentially also lost revenue, compromised security, and damaged reputation. Yet despite

Read More
An illustration of various types of IoT devices in a smart home
IoT

Managing IoT Devices: A NetOps and SecOps Security Guide 

The proliferation of IoT devices across enterprise networks has fundamentally changed the security and operational landscape for NetOps and

Read More
A set of scales in a digital environment, representing enterprise risk management
Security Operations

Enterprise Risk Management: A Comprehensive Guide

Enterprise risk management (ERM) is a strategic approach meant to help businesses identify, assess, and respond to these risks

Read More
Chain made of digital data, representing the supply chain
Security Operations

Understanding Supply Chain Attacks: Methods, Risks, and Defenses

Supply chain attacks have become a greater risk as businesses grow more interconnected. Rather than directly targeting an organization,

Read More
A picture of a cartoon courthouse looking dark and gloomy surrounded by locks meant to depict a cyber attack.
Network Security

Navigating the Rising Tide of Stealth Cyber Threats: A 2024 Perspective

As we navigate through 2024, the cybersecurity landscape is increasingly dominated by stealth and sophistication. The recent CrowdStrike Global

Read More
Plixer One dashboard showing alarms related to user/entity behavior
Deep Network Observability

Enhancing Security with Behavior Analytics   

User and Entity Behavior Analytics (UEBA) provides the critical insights needed to identify these hidden dangers by monitoring behavioral

Read More
joanna
Security Operations

5 ways of verifying security risks and avoiding false positives

I think I can safely assume that everyone knows the cautionary tale of the boy who cried wolf. If

Read More
joanna
Security Operations

VPN security for a rapidly scaling remote workforce

We’ve all had days when we think to ourselves, “Man, I wish I could just work from home in

Read More
mikel
Configuration

How to set up Scrutinizer single sign-on with Azure AD

Single sign-on (SSO) is a way to secure users while reducing the number of passwords they need to remember.

Read More