• PacketViper Presents CyberTalk360

    Written by: Ken Wolf | Published on: August 20th, 2021

    About The Author

    Ken Wolf

    PacketViper presents CyberTalk360, a 15-minute webinar series about all things cybersecurity. 2021 presents a multitude of cybersecurity challenges. It’s challenging to sort through the clutter and make sense of it all. That’s why we’re launching this webinar. Each month our team will get together to dig into the latest news, issues and newsworthy cybersecurity topics. … Continue reading >>>

  • A Compensating Control for the Vanishing Air Gap

    Written by: Don Gray | Published on: April 28th, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Operational technology (OT) networks are becoming more connected to IT environments. As such, the once dependable ‘air gap’ protection between IT and OT no longer exists. This creates cyber risk that can result in substantial financial losses, the disruption of essential services, and possibly affect national security and public welfare. For organizations relying on OT, … Continue reading >>>

  • Download PacketViper’s Ransomware Use Case for OT and IT

    Written by: Don Gray | Published on: February 23rd, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Ransomware Image for PacketViper Use Case to Harden OT Security Without Risking Downtime

    Ransomware is on the rise and the increasing convergence of information technology (IT) and operational technology (OT) networks creates new pathways for attackers into coveted OT environments. As connected OT networks become more accessible to threat actors of all motivations, security teams need to look at more pragmatic ways to harden OT security without the … Continue reading >>>

  • Register for PacketViper’s CyberTalk360 February 16 Webinar

    Written by: Ken Wolf | Published on: February 2nd, 2021

    About The Author

    Ken Wolf

    Register for PacketViper’s CyberTalk360 February 16 Webinar, a 15-minute discussion about all things cybersecurity. 2021 presents a multitude of cybersecurity challenges. It’s challenging to sort through the clutter and make sense of it all. That’s why we’re launching this webinar. Each month our team will get together to dig into the latest news, issues and … Continue reading >>>

  • Transform Threat Hunting

    Written by: Francesco Trama | Published on: November 11th, 2020

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    into proactive threat hunting

    How can you transform threat hunting? Consider this home security scenario: Imagine you have a choice of two home security systems: The first one only alerts you about intruders after they have broken into your house. The second one works when the threat is on your front lawn and keeps it away. Which do you … Continue reading >>>

  • Bit-and-piece DDoS threats are on the rise

    Written by: Francesco Trama | Published on: September 29th, 2020

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Fight DDoS Attacks with Packetviper Deception360

    Distributed denial of service (DDoS) attacks are on the rise. According to the Nexusguard Q2 2020 Threat Report, overall DDoS attacks increased by 515% year over year. And ‘bit-and-piece’ style attacks were up 570% compared to the same period last year. So how can you deceive bit-and-piece DDoS threats? This is a challenge, especially now, … Continue reading >>>

  • 3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

    Written by: Don Gray | Published on: February 3rd, 2020

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

      Heightened geopolitical tensions led to a recent warning from CISA on strengthening cyber defenses in anticipation of increased nation-state cyber attacks.  While we know the specific nation-states we are most concerned with, targeting defenses against them is tricky. Attackers have abundant resources to wage dynamic, persistent attacks. Unfortunately, common cyber defense solutions are typically … Continue reading >>>

  • Mitigate EDoS Attacks: Creeping Normality and the Boiling Frog Fable

    Written by: Don Gray | Published on: December 18th, 2019

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Everyday Denial of Service (D0S)

    Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It’s time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated.

  • VRM with Deception360: Real-time monitoring of your connected vendors

    Written by: Don Gray | Published on: November 21st, 2019

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    continuous vendor risk managment

    Is your organization looking for a way to protect against a vendor-related breach? Do you want to enforce policies around how your vendors behave on your network? Read this blog to learn how.

  • How to Detect and Prevent Ruthless Cryptojacking

    Written by: Francesco Trama | Published on: October 25th, 2019

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    cryptojackers

    This blog takes a look at crypto mining from a networking perspective. Fundamentally, crypto mining is a very long-lived TCP connection between a client and a server. The ports and protocol can vary, and the TCP communication can be encrypted. Discover how to prevent the worm from completing its crypto mining task.

  • Build a Business Case for Deception Technology

    Written by: Francesco Trama | Published on: October 1st, 2019

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    NCSAM 2019

    Three unique use cases build a business case for deception technology as we mark the start of National Cyber Security Awareness Month (NCSAM).

  • NIST gets down with Deception

    Written by: Don Gray | Published on: July 31st, 2019

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    A lot of CISOs look to the National Institute of Standards and Technology (NIST) and ISO for third-party validation of appropriate security controls and security program approaches. In this blog, read how NIST recommends Deception for protecting critical programs and high-value assets.

  • Deception Gets Screen Time at Gartner Security Risk and Management Summit 2019

    Written by: Don Gray | Published on: June 25th, 2019

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Don Gray recaps the Gartner® Security and Risk Management Summit 2019 commenting on three key points: deception prominently referenced in the keynote presentation, 7 imperatives of CARTA, and DevSecOps.

  • What is Internal and External Cyber Deception Technology?

    Written by: Francesco Trama | Published on: April 16th, 2019

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Internal and external cyber deception technology together is not your traditional approach to deception, nor to security in general. Since the days of honeypots, cybersecurity experts have utilized deception as a way to protect the network interior. Threat detection at the network perimeter, on the other hand, has seemingly been the role of firewalls. Read More…

  • Deception at the cyber “front line”

    Written by: Francesco Trama | Published on: March 19th, 2019

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Cyber Deception Front Line

    Whatever you call the front, the ability to stop the enemy where you first face them is vital. A paired approach of deception both externally and internally represents a tremendous opportunity to reduce attack vectors and strengthen overall cyber defense.

  • Announcing PacketViper at RSAC Early Stage Expo

    Written by: Francesco Trama | Published on: February 13th, 2019

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    RSAC Early Stage Expo

    Be our guest at RSAC 2019. Register with our special code to gain entrance to the RSAC Expo arena. Visit the large halls at the Moscone but also come visit us at the Early Stage Expo in the Marriott just down the street from the conference.

  • Four cyber deception delusions diminished

    Written by: Francesco Trama | Published on: January 17th, 2019

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Successful adoption of cyber deception as an impactful security tool, and more than just another data generating detection solution, demands avoidance of these four common delusions. .

  • Remove botnets’ freedom to operate and manage botnet risk

    Written by: Francesco Trama | Published on: December 7th, 2018

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    botnet risk

    There are plenty of news articles claiming botnets and zombie computers are taking over the world.  While I do not necessarily agree with the allegation, I believe whole heartedly botnets are the driving force of all attacks. Botnet risk is at it’s all time high. By hook or by crook, the first goal for any attacker … Continue reading >>>

  • Vendor Risk – Times are a Changin’

    Written by: Francesco Trama | Published on: November 15th, 2018

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Vendor Risk

    Vendor Risk is a relatively new anomaly. I sometimes wonder how we ever got through the 90’s. It seems like only a few years ago when vendors received a key, code, or swipe card to come through the front door of our buildings whenever they liked. We trusted them to do their job once inside. I … Continue reading >>>

  • Take password protection seriously and practice what you preach

    Written by: Francesco Trama | Published on: November 7th, 2018

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    password protection

    Over the past several weeks I have been practicing what I preach about password protection. I changed all my passwords to each of my online accounts to a unique password with a minimum of 20 random characters. I thought this would be a fairly simple thing to do. I decided on a common password manager, … Continue reading >>>

  • FOR SALE:  A much smaller cybersecurity haystack

    Written by: Don Gray | Published on: October 10th, 2018

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Cybersecurity Haystacks

    It’s budget season. For enterprise cybersecurity teams that means getting ready to ask for more. In most cases, not enough, but definitely more budget to find the needles in the haystacks. And most likely, more of the same stuff you already have. Far too many cybersecurity leaders are going to ask their executive teams for drastically … Continue reading >>>

  • It’s time to take a different approach to utilizing threat intelligence

    Written by: Don Gray | Published on: September 25th, 2018

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    network defense

    Threat Intelligence has gotten a lot of attention in the last few years. What is it? Who understands it? Is it actionable?  Plus think about the substantial investment for security organizations to create such a perishable good and then actually using it to protect a network can be complicated. Don’t forget the numerous reports about … Continue reading >>>

  • A Paradigm Shift for Cybersecurity Managed Service Providers

    Written by: Francesco Trama | Published on: September 5th, 2018

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    PacketViper Partner Program

    Shifts in the current cybersecurity service provider market somewhat resemble an episode of the infamous game show Wheel of Fortune, where contestants purchase letters to capitalize and prosper on the show. We’ve seen Managed Service Providers (MSPs) “buy an S”, or invest heavily in their businesses in order to become a Managed Security Service Provider … Continue reading >>>

  • Hackers For Hire

    Written by: Francesco Trama | Published on: November 30th, 2017

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    In today’s society, when someone speaks of a “hacker”, we automatically assume that the person was trying to do something illegal and perform a major scam or breach into a network. The term “hacker” stirs up controversy among organizations and leaves a sore-spot with many. What if there was a solution… Are there good hackers today? If you answered “YES”, then you answered correctly.

  • The Insanities of Network Security

    Written by: Francesco Trama | Published on: November 15th, 2017

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Thinking you have to allow every connection to every open network port. Thinking because you have a VPN portal it’s secure. Thinking your a IDS isn’t based on variables on the past, and can predict the future. Thinking you won’t be chasing your tail over and over on false positives, and will not become jaded. … Continue reading >>>

  • Irony of Network Security

    Written by: Francesco Trama | Published on: October 5th, 2017

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    As I read through articles on the latest security threats, breaches, door opening exploits, and vulnerabilities that left doors opened. I Ironically see a firewall ad next to the security article saying ‘The Complete Firewall Solution, Get Total Visibility Into Your Security”. The article in Reuters explained how many security systems found they were susceptible … Continue reading >>>

  • Network Security Convolution

    Written by: Francesco Trama | Published on: August 30th, 2017

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    It takes an army of security professionals today to identify, isolate, track, and eliminate security threats, and breaches. The convolution within network security, in my opinion, has reached irresponsible levels. The days of the past where anomalies were quickly squashed by the network staff on hand is over from what I’m reading. It always seems … Continue reading >>>

  • Overcoming the #1 Security Challenge in Operations

    Written by: Francesco Trama | Published on: August 21st, 2017

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    The Problem The overwhelming volume of global IP traffic hitting networks today creates a crushing amount of security alerts. Too frequently, many of these alerts go unchecked while the quantity of alerts increases daily. Additionally, security analyst teams are frequently understaffed and resources/expertise are scarce across the industry. Together this presents the biggest security challenge … Continue reading >>>

  • WannaCry over WannaCrypt? PacketViper Blocks New Ransomware Threat

    Written by: Francesco Trama | Published on: August 18th, 2017

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    The ransomware that brought hospitals throughout England and Scotland to an operational standstill is a strain of WannaCry/WannaCrypt ransomware which contains a potent and dangerous payload called ExtendBlue. What if you could block the ransomware? ExtendBlue exploits Microsoft’s SMB protocol and gives it legs. ExtendBlue allows the attacker to discover new exploitable systems within the … Continue reading >>>