Subscribe to our blog!

Post by Category

0 Comments

PacketViper Warns Popular DVR Surveillance Systems Still Spreading Mirai

  Mirai Back Story

View Post
0 Comments

Advanced Ip Filtering- What it is

Advanced-Ip filtering is a network security tool that allows or denies network traffic based on geographical location. Sometimes referred to as country filtering or blocking, Advanced-Ip filtering allows your network to choose places in the world from which it will accept network traffic. More importantly, innovative designs in Advanced-Ip Filtering enable new and unparalleled levels of precision ...

View Post
0 Comments

Six Ways To Secure Yourself From Online Assailants

We are now in a day of age where we have access to absolutely everything at the tip of our fingers.  With technology so advanced, we can easily check and send emails, shop, surf the web and so much more; but, this also puts a target on our back for stolen information. Have you noticed that there’s always another breaking news headline of a company getting hacked, a store getting their data ...

View Post
0 Comments

Kill Chain Tactics In Network Security

Nov 4, 2016

Category: Network Security, Cybersecurity

I read a good article on Kill Chain tactics. The article subtile was: What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason I understood the thinking, just not applicable for all businesses. Below is the response I wrote. I thought it would be useful to everyone if you're considering this approach. I ...

View Post
0 Comments

Financial Institutions Network Security Is Being Blinded!

Today, Financial institutions (not limited to) are being over run with security logging and alerting. Each new monitoring and alerting device adds more things to consider when evaluating threats on a daily basis. You would think this would help, and is a good thing? It is and isn't at the same time. We bury our faces in reports, sift log after log for the magic bullet, set up countless alerts on ...

View Post
0 Comments

Small Business: Soft Underbelly Of Security

Small businesses are the glue that keeps the economic machine moving around the world. Billions of us the them daily, from coffee to teeth cleaning. Although statistics vary the US small business is estimated to employ between 43%-51% of the workforce.  That's a big number. In a Ponemon small business study dated early 2013 stated:

View Post
0 Comments

The Unavoidable "Whoops" In Network Security

WE all make mistakes, its a human condition, and not curable. In network security when we make mistakes to a configuration, it's referred to as "Fat Fingering". I can say honestly on several occasions in my network youth, while deep into chasing false positives, on gallons of caffeine, and eyes nearly bleeding, I made mistakes.

View Post
0 Comments

100% of Friday's DDoS Victims Have This in Common...

Friday’s massively disruptive DDoS attack was a sobering reminder that we've entered a new era of DDoS threats.  These threats require a new approach to perimeter defense. None of Friday's victims had PacketViper.  None of PacketViper's clients have been hit with DDoS.

View Post
0 Comments

BIGGEST DDoS ATTACK TO DATE

Sep 29, 2016

Category: Network Security, Cybersecurity, Hack, DDoS, Breach, Alerts

Disaster struck on Tuesday, September 20, 2016, when the record for the Largest DDoS attack was broken. The assault on ‘‘Krebs on Security’’ left engineers at Akamai,the company that protects “krebsonsecurity.com”, bewildered.  Workers at Akamai watched the traffic being directed to their website drastically increase, which left engineers needing to act fast. Engineers worked endlessly to secure ...

View Post
1 Comment

"Hackers For Hire"

The term “hackers” dates back to the 1960s at MIT.  “Hacker” is used to describe extremely skilled individuals that practiced hardcore programming in FORTRAN and other older languages (HelpNet Security). In today’s society, when someone speaks of a “hacker”, we automatically assume that the person was trying to do something illegal and perform a major scam or breach into a network. The term ...

View Post