How to Set Up Enhanced Wireless Network Visibility
It has been several years since Cisco introduced wireless NetFlow support on their Wireless LAN Controller (WLC) platforms. Using the Application Visibility and Control...
It has been several years since Cisco introduced wireless NetFlow support on their Wireless LAN Controller (WLC) platforms. Using the Application Visibility and Control...
We’ve all come across spoofed emails at some point, and they are a real threat to the security and safety of our organizations and...
This month I was working with a customer who was having a hard time understanding what AP MAC was being reported by Scrutinizer when...
Last year our CEO asked if I would be interested in starting a Girls Who Code club in our local school system. He had...
How do you maintain an environment that is both open and secure? Many professionals who work in education cybersecurity have to answer this question,...
The first blog in this series discussed the importance of including information security in the strategic planning of any educational institution. In today’s blog...
Near the end of last year, Financial Services Superintendent Maria T. Vullo announced that the New York State Department of Financial Services (DFS) had...
For the last few decades, security teams have taken a “point product” and best-of-breed approach to securing their environments. Although historically this approach has...
Back in April of this year, the Swift international money transfer network which connects 11,000 global banks in over 200 countries was used to...
The Plixer team recently had the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim, California. Over the course of the show we...
Looking for documentation? Visit our documentation site