

Bob Noel
VP of Strategic Partnerships /*=$expert->feature_status*/ ?>
Plixer
Comments Dotted :
5
March 11, 2020
Organizations of all sized must recognize that compromise is no longer a matter of if, but when.
Success rates for compromising employees accounts are rising in large part to more effective social engineering efforts. Bad actors have greater access to personal information via social media platforms like Facebook, Twitter, Instagram, LinkedIn, and others. They are able to use this information to send targeted phishing attacks, tricking users into clicking on malicious links. Once the bad actor has a foothold and access to valid user credentials, they will stealthily move laterally in search .....Read More

February 18, 2020
At this point, everyone should constantly operate under the assumption that they are already compromised.
Although the recent uptick in global tensions has elevated the perception of risk for many organizations, many have not implemented proper solutions to monitor and visualize their network traffic. At this point, everyone should constantly operate under the assumption that they are already compromised. There is a never-ending stream of new vulnerabilities and every organization, every day, has vulnerable devices connected to the business. Network traffic analysis (NTA) is a must-have technology.....Read More

February 04, 2020
When end devices (IoT or other) have an IP address and are attached to the corporate network.
When end devices (IoT or other) have an IP address and are attached to the corporate network, they introduce new threat surfaces. It is imperative that network and security teams know every device that is attached to the network, and monitor all traffic to and from them so those end devices can be provisioned, monitored, and secured properly. The only way to do this properly is to deploy and correlate network traffic analysis with end device visibility/asset management tools.

February 03, 2020
This means that cloud customers do not have the same visibility and awareness that they have when workloads are deployed on-premise.
Although public cloud adoption rates are high, many organizations are still hesitant to move business-critical workloads to the cloud for fear of security compromise. A big part of the problem is that cloud providers obfuscate visibility to their customers relative to the underlying network traffic and infrastructure. This means that cloud customers do not have the same visibility and awareness that they have when workloads are deployed on-premise. This visibility gap is an inhibitor to broader .....Read More

November 04, 2019
Any organization that has fallen victim to this infection must proactively begin to look for credential misuse.
Although the mechanisms by which QNAP spreads are unclear at this time, the fact that it steals usernames and passwords for all NAS users is very concerning. Any organization that has fallen victim to this infection must proactively begin to look for credential misuse. Bad actors who have stolen valid credentials will use them to try an gain access to other resources. As a best practice, network traffic analysis (NTA) should be implemented within the organization. NTA can baseline normal.....Read More
