All Security Operations
A picture of a cartoon courthouse looking dark and gloomy surrounded by locks meant to depict a cyber attack.

Navigating the Rising Tide of Stealth Cyber Threats: A 2024 Perspective

As we navigate through 2024, the cybersecurity landscape is increasingly dominated by stealth and sophistication. The recent CrowdStrike Global Threat Report highlights a dramatic...

Plixer One dashboard showing alarms related to user/entity behavior

Enhancing Security with Behavior Analytics   

User and Entity Behavior Analytics (UEBA) provides the critical insights needed to identify these hidden dangers by monitoring behavioral patterns across users and entities,...

abstract background with coding overlayed ontop of an AI person

ML in the Age of AI – Where ML Fits in Network Security in 2024 and Beyond 

Author: Ryan Mellmer, Plixer Software Engineer The world is currently in an AI (Artificial Intelligence) revolution. AI is everywhere today; in the news, in...

Image of screengrabs of various healthcare websites and patient portals

Preventing Data Breaches in Healthcare: How to Gain Control and Efficiency with Ironclad NDR and NPMP from Plixer

Author: Stephanie Kille, Customer Success Manager, Plixer Recent years have seen a disturbing trend of healthcare data breaches, with cybercriminals targeting organizations across the...

gloomy forest scene

Unmasking the Covert Threat: How Plixer Shields Networks from the Sophisticated Agent Raccoon

The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why...

Using MITRE ATT&CK® with the Plixer Platform

Any security analyst will tell you that the most challenging part of the job is knowing what to respond to. There is no shortage...

padlock securing a door

The importance of encrypted traffic analytics to your network security posture

Data security is a critical aspect of any organization’s IT infrastructure. With the explosion of cyber threats, it has become ever-important to ensure that...

View of space beyond treelined

3 cybersecurity trends you should pay attention to

How prepared for an attack are you? The most recent Microsoft Defence Report found volume of password attacks has risen to an estimated 921...

rickj

XDR: A better mousetrap or just more hype?

XDR stands for eXtended Detection and Response. What it is depends on who is explaining it. XDR evolved very quickly from Network Detection and...

logj

Protect your network from Log4j and future vulnerabilities

Earlier this month, a vulnerability in the Apache Log4j logging framework was disclosed. The zero-day vulnerability was published by Alibaba Cloud’s security team as...