PacketViper Blog

Notes from the Field

Blog

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

Attackers rely on proxies because they work. What if you could make proxies work against them? Well, you can, using deception at your network edge.

Securing Critical Infrastructure and Operational Technology (OT) Networks and Systems

Securing Critical Infrastructure and Operational Technology (OT) Networks and Systems

Gartner defines Operational Technology (OT) as "hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events".

Read more

A Compensating Control for the Vanishing Air Gap

A Compensating Control for the Vanishing Air Gap

Our new use case covers how PacketViper solutions can be deployed to 'shroud' or 'screen' previously air gapped, critical OT assets.

Read more

Case Study: Water authority cyber-physical defense

Case Study: Water authority cyber-physical defense

This case study explains how PacketViper successfully defended against a red team simulating a physical breach of pump stations through a control panel.

Read more