Subscribe to our blog!

Post by Category

1 Comment

"Hackers For Hire"

The term “hackers” dates back to the 1960s at MIT.  “Hacker” is used to describe extremely skilled individuals that practiced hardcore programming in FORTRAN and other older languages (HelpNet Security). In today’s society, when someone speaks of a “hacker”, we automatically assume that the person was trying to do something illegal and perform a major scam or breach into a network. The term ...

View Post
0 Comments

Perimeter Security Myths Busted: Infographic

DDoS attacks are becoming more prevalent and attackers are getting better at bombarding you with traffic that appears legitimate.  Low and slow attacks harass your network and set the stage for exfiltration.  Sound defense depends on rapid response and a strong perimeter.  A better way of defending yourself begins by rethinking the perimeter.  Check out our infographic to better understand how ...

View Post
0 Comments

Why These Three Industries Can Benefit Greatly From PacketViper

FINANCIAL SERVICES

View Post
0 Comments

Will Spectators Devices Be Secure At This Year’s 2016 Summer Olympics in Rio de Janeiro?

As many of you may know, in just a few short weeks, the 2016 Summer Olympics will take place in Rio de Janeiro, Brazil.  Many people will travel from all around the world to experience the best of the best compete to become an Olympic winner. With all of the athletes, spectators, and fans waiting inside and outside of the arena, many of them will be using their mobile devices to tweet, post, ...

View Post
0 Comments

Hackers Hiding Behind Top-Rated Security Products to Breach Our Personal Devices

It is no secret that hackers are becoming more and more advanced while technology is ever evolving.  They are becoming smarter and wittier to the “traps” that top rated Government Affiliations are setting. On July 7, 2016, there was a stern warning issued to the public, made by the U.S Department of Homeland Security, in regards to all Symantec and Norton branded anti-virus users. The warning was ...

View Post
0 Comments

Threat Monitoring Isn’t A Cure-All-Fix-All

Threat Detection services and systems are a lot like an antivirus program. How so? It's built on the history of what we know, and to some degree provides a “good guess” of what potential some traffic may accomplish. This is also known as false-positives. So does it protect you from all harm to your network, allowing you to work worry-free? Absolutely not. If you think about this concept, threat ...

View Post
0 Comments

How to Guard Against Advanced Persistent Threats

Feb 18, 2016

Category: Threat Detection

When it comes to network security, there are a number of different types of threats to be aware of. Among the most detrimental are the Advanced Persistent Threats (APTs), which according to Wikipedia’s definition are “An advanced persistent threat is a set of stealthy and continuous computer hacking processes, which target a specific entity. That entity can be a person, a company or organization, ...

View Post
0 Comments

Threat Detection: Is it a False Sense of Security?

Jan 7, 2016

Category: Threat Detection

When it comes to cybersecurity, there’s a myriad of potential threats to deal with, from viruses to malware to Trojans and more. Today’s threat detection systems deal with those attacks by focusing mainly on history. What does that mean? It means that threat detection is based on what the system knows. And what it knows comes mainly from threats that it and other threat detection systems have ...

View Post