0 Comments

"Hackers For Hire"

The term “hackers” dates back to the 1960s at MIT.  “Hacker” is used to describe extremely skilled individuals that practiced hardcore programming in FORTRAN and other older languages (HelpNet Security). In today’s society, when someone speaks of a “hacker”, we automatically assume that the person was trying to do something illegal and perform a major scam or breach into a network. The term ...

View Post
0 Comments

SILENCE OR REBELLION- What Will Be Next With the NSA Hack?

News stations and the internet have been going crazy with the recent information that the NSA has recently been hacked. The hack exposed top-secret, government computer code which was created by the National Security Agency’s elite group of hackers.  This code was used to break into different networks of foreign governments and other espionage targets without being noticed or detected. The next ...

View Post
0 Comments

Perimeter Security Myths Busted: Infographic

DDoS attacks are becoming more prevalent and attackers are getting better at bombarding you with traffic that appears legitimate.  Low and slow attacks harass your network and set the stage for exfiltration.  Sound defense depends on rapid response and a strong perimeter.  A better way of defending yourself begins by rethinking the perimeter.  Check out our infographic to better understand how ...

View Post
0 Comments

DNC Should Rethink the Perimeter

Jul 25, 2016

Category: cybersecurity, hack, spear-pfishing, DNC, Breach, perimeter

PacketViper.  Make data safe again.

View Post
0 Comments

Why These Three Industries Can Benefit Greatly From PacketViper

FINANCIAL SERVICES

View Post
0 Comments

Will Spectators Devices Be Secure At This Year’s 2016 Summer Olympics in Rio de Janeiro?

As many of you may know, in just a few short weeks, the 2016 Summer Olympics will take place in Rio de Janeiro, Brazil.  Many people will travel from all around the world to experience the best of the best compete to become an Olympic winner. With all of the athletes, spectators, and fans waiting inside and outside of the arena, many of them will be using their mobile devices to tweet, post, ...

View Post
0 Comments

Hackers Hiding Behind Top-Rated Security Products to Breach Our Personal Devices

It is no secret that hackers are becoming more and more advanced while technology is ever evolving.  They are becoming smarter and wittier to the “traps” that top rated Government Affiliations are setting. On July 7, 2016, there was a stern warning issued to the public, made by the U.S Department of Homeland Security, in regards to all Symantec and Norton branded anti-virus users. The warning was ...

View Post
0 Comments

Financial Service Organizations: Why Your Firewall Isn't Enough

Jun 29, 2016

Category: cybersecurity, Financial Services

Financial organizations experienced a 40 percent increase in cybercrime over the past year, with 63 percent of companies reporting daily or weekly attacks. Firewalls and other preventive cybersecurity measures take up 80 percent of your network security budget, but these solutions don't keep up with zero-day attacks and sophisticated hackers. You face many threats your firewall isn't capable of ...

View Post
0 Comments

Key Network Security Challenges Faced by Financial Services and How to Solve Them

Jun 27, 2016

Category: cybersecurity, Financial Services

Financial services institutions are a primary target of cybercriminals, with valuable data and complex infrastructure creating an irresistible target for many intruders. Additionally, this industry suffers from the largest losses due to attacks, with an average cost of $13.5 million. Reputation damage from data breaches is another significant concern for 34 percent of financial services ...

View Post
0 Comments

How Advanced IP Filtering is Transforming Healthcare Security

Jun 21, 2016

Category: HealthCare, cybersecurity

Healthcare networks are a prime target for cybercrime. The life-saving services, data and business operations included in the healthcare model have also become quite the lucrative target for cybercriminals.

View Post