Posts by Topic

see all

Subscribe to our blog!

2 Comments

Threat Intelligence: Past performance does not indicate future results

Most investors have seen the disclaimer, “Past performance is not indicative of future results.”  Network security professionals should have this in mind while considering threat intelligence as a foundational element for security strategies.  The rapidly and ever-changing threat landscape makes the value of historical threat intelligence alone in predicting cyber attacks uncertain and the ...

View Post
1 Comment

PacketViper Warns Popular DVR Surveillance Systems Still Spreading Mirai

  Mirai Back Story

View Post
0 Comments

HISCOX Cyber Readiness Report Says "Detection Is Challenging"

Feb 22, 2017

Category: Cybersecurity, Detection

 

View Post
0 Comments

Technology Research and Advisory Companies Need to Get Real!

Feb 21, 2017

Category: Cybersecurity

Do you ever wonder who these technology research and advisory companies are speaking to when they write recommendations on security. If everyone had eight eyes, ten arms, two brains, and an unlimited budget, security would be spectacular! Well, maybe! Unfortunately, the reality of nature that limits our physiology and budgets dictates something different. 

View Post
0 Comments

Most Dangerous Malware Threats

Feb 2, 2017

Category: Cybersecurity, Threats, Virus, malware

If , you’re connected to the Internet all day. This is why it's crucial to protect and secure your devices and data from malicious software. Malware is a wide range of software applications created with a malicious intent. Unlike legitimate software, malware is installed on your computer without your consent. Malware can be introduced to your computer in a variety of ways such as a virus, worm, ...

View Post
0 Comments

Security Zen and How to Achieve it

Feb 1, 2017

Category: Cybersecurity, malware

Computer technology extends to almost every area of society and social sphere. Our pre-Internet way of life is now consigned to the history books – no one born after the early 1990s has experienced a world without the Internet.

View Post
0 Comments

Top 6 Cyber-Security Predictions for 2017

Jan 27, 2017

Category: Cybersecurity, malware, Predictions, 2017

What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here’s a roundup of what we here at PacketViper are saying about the year ahead — and what you can do to prepare.

View Post
0 Comments

Advanced Ip Filtering- What it is

Advanced-Ip filtering is a network security tool that allows or denies network traffic based on geographical location. Sometimes referred to as country filtering or blocking, Advanced-Ip filtering allows your network to choose places in the world from which it will accept network traffic. More importantly, innovative designs in Advanced-Ip Filtering enable new and unparalleled levels of precision ...

View Post
0 Comments

Six Ways To Secure Yourself From Online Assailants

We are now in a day of age where we have access to absolutely everything at the tip of our fingers.  With technology so advanced, we can easily check and send emails, shop, surf the web and so much more; but, this also puts a target on our back for stolen information. Have you noticed that there’s always another breaking news headline of a company getting hacked, a store getting their data ...

View Post
0 Comments

Kill Chain Tactics In Network Security

Nov 4, 2016

Category: Network Security, Cybersecurity

I read a good article on Kill Chain tactics. The article subtile was: What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason I understood the thinking, just not applicable for all businesses. Below is the response I wrote. I thought it would be useful to everyone if you're considering this approach. I ...

View Post