Plixer Blog

a screensgrab of the Plixer One Dashboard

Author: Erik Peterson, Sr. Director of Engineering at Plixer Experience Network Detection and Response with Plixer’s Latest Release: Plixer 19.4 ML Engine August 2024 marks an exciting milestone for Plixer customers seeking to enhance security with the .

Image with the words

Top 4 Features That Make Plixer One A Must-have In Your Cybersecurity Stack

abstract background with coding overlayed ontop of an AI person

ML in the Age of AI – Where ML Fits in Network Security in 2024 and Beyond

The word malware on a monitor emphasized in a magnifying glass surrounded by code.

Prevent Catastrophic Cyber Attacks: Lessons from 600,000 Routers Compromised by Mystery Malware

image of a man sitting in front of a computer and servers, the service are on fire. The man has a calm face with a thumbs up.

Why Top Talkers Are The Least Of Your Worries

Don't miss a thing!

Elevate your network performance and cybersecurity know-how. Sign up for our blog to unlock exclusive insights, expert analysis, and actionable NMPD and NDR tips.

Image of screengrabs of various healthcare websites and patient portals

Preventing Data Breaches in Healthcare: How to Gain Control and Efficiency with Ironclad NDR and NPMP from Plixer

Author: Stephanie Kille, Customer Success Manager, Plixer Recent years have seen a disturbing trend of healthcare data breaches, with cybercriminals targeting organizations across the.

BingHamton University State University of New York and Plixer Logo

A Conversation with Scott Hoeppner: Binghamton University’s Solution to Better Network Visibility & Security

Here at Plixer, we are redefining what it means to know your network. Today’s networks are becoming infinitely more extensive and dynamic as data.

gloomy forest scene

Unmasking the Covert Threat: How Plixer Shields Networks from the Sophisticated Agent Raccoon

The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why.

The Essential Role of Network Monitoring in Network Security

Every year, there is a greater number of breach disclosures. Some do so for the first time; for other organizations, it’s the latest in.

Expanding Horizons: Scrutinizer’s Latest Release Deepens Visibility from Core to the Cloud

In an ocean of data and interconnected devices ranging from physical and virtual networks to the cloud, ensuring complete visibility and monitoring of your.

Map of decoy dog attacks

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have.

a coder inspecting a zero day attack leading to a data breach

The Impact of a Data Breach

Dive into the recent HCA data breach and learn how a zero-day attack can quickly cause damage to your business.

Analyst looking for the MOVEit vulnerability to prevent a cyber attack.

What is the MOVEit Vulnerability and How To Detect It

By now you have probably heard of a vulnerability in MOVEit or its use by the hacking group ClOp. This cyber attack is all.

A desktop, mobile phone and laptop, representing a variety of endpoint security vulnerabilities

Endpoint security stats you need to know

Endpoint security is crucial for protecting your organization from cyber threats. With the increasing vulnerabilities posed by human actions, it’s essential to have key.