All
a coder inspecting a zero day attack leading to a data breach

The Impact of a Data Breach

Dive into the recent HCA data breach and learn how a zero-day attack can quickly cause damage to your business....

Analyst looking for the MOVEit vulnerability to prevent a cyber attack.

What is the MOVEit Vulnerability and How To Detect It

By now you have probably heard of a vulnerability in MOVEit or its use by the hacking group ClOp. This cyber attack is all...

A desktop, mobile phone and laptop, representing a variety of endpoint security vulnerabilities

Endpoint security stats you need to know

Endpoint security is crucial for protecting your organization from cyber threats. With the increasing vulnerabilities posed by human actions, it’s essential to have key...

Is NetFlow useful for security analysis?

Network flow data (NetFlow, IPFIX, sFlow, etc.) is telemetry data extracted from your network infrastructure. Network Operations teams frequently tap into this data set...

What is Deep Network Observability?

Network Observability is the ability to collect, analyze, and activate network data. With network observability, you can easily answer questions about your network. Deep...

Why Other NDR Solutions Are So Expensive

If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure to monitor, ingest, and analyze...

Using MITRE ATT&CK® with the Plixer Platform

Any security analyst will tell you that the most challenging part of the job is knowing what to respond to. There is no shortage...

River Delta

Adding Endpoint Analytics to Flow Data

When we think about the world of Network Flow data, we usually think within Layers 3, 4, and 5. Typically IP addresses are as...

padlock securing a door

The importance of encrypted traffic analytics to your network security posture

Data security is a critical aspect of any organization’s IT infrastructure. With the explosion of cyber threats, it has become ever-important to ensure that...