Subscribe to our blog!

Post by Category

1 Comment

5 Steps to Reducing Brute-Force & DDoS Attacks

Jun 20, 2017

  Relentless brute-force attacks and distributed denial of service (DDoS) attacks against enterprises continue to be on the rise. Most recently we have seen Mirai, and now there is Hajime. While these cyberattacks bear some technical differences, network administrators need to be concerned with the similarities of their objectives. DDoS and brute-force attacks both seek to gain access to the ...

View Post
2 Comments

Threat Intelligence: Past performance does not indicate future results

Most investors have seen the disclaimer, “Past performance is not indicative of future results.”  Network security professionals should have this in mind while considering threat intelligence as a foundational element for security strategies.  The rapidly and ever-changing threat landscape makes the value of historical threat intelligence alone in predicting cyber attacks uncertain and the ...

View Post
0 Comments

Generate custom edge intelligence & transparency with PacketViper

Edge Intelligence Drives Proactive Network Defense Network security executives are increasingly identifying visibility as one of their top priorities.  This is reinforced in a new study of over 220 senior IT executives.   CXOtoday News Desk: Network Visibility top CIO Priority Visibility at the perimeter is essentially important.  The ability to shine bright lights on the ingress & egress traffic ...

View Post
0 Comments

Proactive Threat Hunting: 2 Tips to Push the Hunt to the Perimeter

Mar 21, 2017

Category: Threats, Packetviper, Threat Hunting

Today’s threats demand more easy, proactive ways to identify, detect and respond to sophisticated attacks. Traditional security measures such as firewalls, IDS, endpoint protection, & SIEMs are each important, but each is only a piece of the network security puzzle.

View Post
0 Comments

Is Your IoT Cyber Defense Plan Really a Plan To Fail?

Much concern and effort today revolves around protecting networks from the the awesome power of a large scale DDoS attack like Mirai.  While the spreading of bots can be done in many forms, a good majority are spread by a simple scan to a network range, a response, then a password attempt. This is true for WAN’s and LAN’s and gets to the core of the effectiveness of Mirai.  Mirai was so simple ...

View Post
1 Comment

PacketViper Warns Popular DVR Surveillance Systems Still Spreading Mirai

  Mirai Back Story

View Post
0 Comments

HISCOX Cyber Readiness Report Says "Detection Is Challenging"

Feb 22, 2017

Category: Cybersecurity, Detection

 

View Post
0 Comments

Technology Research and Advisory Companies Need to Get Real!

Feb 21, 2017

Category: Cybersecurity

Do you ever wonder who these technology research and advisory companies are speaking to when they write recommendations on security. If everyone had eight eyes, ten arms, two brains, and an unlimited budget, security would be spectacular! Well, maybe! Unfortunately, the reality of nature that limits our physiology and budgets dictates something different. 

View Post
0 Comments

Cybersecurity: Stop Chasing Your Tail!

Feb 20, 2017

Category: DDoS, mirai, Cyber Attacks

Doesn’t it seem like there are new kinds of risks and attacks on information security from government entities all the way down to security companies? Today, the new trending threats extend to connected cars, refrigerators, TVs, and homes. The scary part… it is only on the rise! The growing risk of cyberattacks combined with the proliferation of new malware technology is astronomical. The rise of ...

View Post
0 Comments

Your Network IS Hacked! 11 Critical Mistakes During Discovery!

Feb 7, 2017

Category: Hack, Breach, Mistakes, Data breach

…And just like that, it happens! You get the call you've been dreading... A user is complaining their machine is running slow and items keep popping up. During the troubleshooting discussion, you discover the critical mistakes that were made.

View Post