Detecting IoT_Reaper with Network Traffic Intelligence
Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of...
Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of...
In the digital era we live in, almost everyone is aware of malware in one form or another. ‘Malware’ is an umbrella term that...
Eek! A rat! No, I don’t mean the cute, little rodent with the long tail; I mean the Remote Access Trojan. Trust me, I...
It seems like every day I talk with network professionals about security and performance, the common theme being speed and ease of use. Having...
Managed Security Service Providers are depending on NetFlow and IPFIX as one of the top 3 enablers for improving network threat detection. The distributed...
Mike Patterson (Plixer CEO and Founder) and I have been long time colleagues in the arena of NetFlow analysis. Over the years we’ve both...
Looking for documentation? Visit our documentation site