• Top 6 Cyber-Security Predictions for 2017

    Written by: Francesco Trama | Published on: January 26th, 2017

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here’s a roundup of what we here at PacketViper are saying about the year ahead — and what you can do to prepare. Rise of the Shadownet –Growth of massive Shadownets, which … Continue reading >>>

  • 5 DDoS Prevention Tips

    Written by: Francesco Trama | Published on: January 25th, 2017

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Distributed denial of Service (DDoS) Attacks can happen out of nowhere and leave a trail of complications for all in its wake. Popular companies such as Microsoft, Amazon, and Netflix are just 3 out of the thousands of companies who have been affected by these cyber incursions. While stopping a DDoS attack before it happens … Continue reading >>>

  • IoT Devices and Their impact on 2017

    Written by: Francesco Trama | Published on: January 23rd, 2017

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    2016 was the know only as the “Year of the Hacker”. Cybersecurity is no longer a side priority. As cyber terrorists continue to perform DDoS Attacks and hold companies for hostage via Ransomware we’re left wondering “How exactly did they breach our systems”. Many would say the “Internet of Things” the “Internet of Things”. What … Continue reading >>>

  • Every minute of every day, a bank is under cyber attack

    Written by: Francesco Trama | Published on: December 7th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    As I read through the article, I couldn’t help wonder how each method the writer described could have been complicated for the attacker if there was a Advanced-IP Layer as the first and last inspection. Article 1: Attacks are not limited just to theft and can take the form of denial of service (DoS) assaults … Continue reading >>>

  • Virtual Grinches Are Trying to Steal Your Christmas

    Written by: Francesco Trama | Published on: December 5th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    For most people, it is their favorite time of the year. We have waited roughly 365 days for stores to have endless sales, in-store and online coupons, and deals we can’t pass up to buy for our family, friends, loved ones, or simply for us. We are all guilty of going to a store and … Continue reading >>>

  • The Jester… Cyber Batman? Or just another Hacker?

    Written by: Francesco Trama | Published on: November 16th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    One hacktivist has decided to stray away from the path of defiling companies and create his own path in the Cyber-World. Only known as “The Jester”, this hacktivist focuses mainly on hacking and shutting down Islamic Extremists Websites. According to Jester he has been conducting these operations for quite some time now. Over the past … Continue reading >>>

  • Advanced Ip Filtering- What it is

    Written by: Francesco Trama | Published on: November 8th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Advanced-Ip filtering is a network security tool that allows or denies network traffic based on geographical location. Sometimes referred to as country filtering or blocking, Advanced-Ip filtering allows your network to choose places in the world from which it will accept network traffic. More importantly, innovative designs in Advanced-Ip Filtering enable new and unparalleled levels … Continue reading >>>

  • What Countries Should I Block?

    Written by: Francesco Trama | Published on: November 4th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Country Blocking is a bit tricky using traditional methods, and a broad stroke approach will be followed with headaches the more and more you block. Not mentioning proxies, which leaves the broad stroke approach a weak methodology, and somewhat a waste of time. Even with the obvious choices of countries that are frequently suggested to block, … Continue reading >>>

  • Top 5 Skills for an IT Manager

    Written by: Francesco Trama | Published on: November 4th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Today’s IT manager faces a diverse range of challenges, from the complexity of enterprise software to the rapidly evolving threats posed by hackers and malware. As a result, IT managers need a particular set of skills to retain control over their company’s IT systems and make the technology work hard for the business. Here are … Continue reading >>>

  • Small Business: Soft Underbelly Of Security

    Written by: Francesco Trama | Published on: November 4th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Small businesses are the glue that keeps the economic machine moving around the world. Billions of us the them daily, from coffee to teeth cleaning. Although statistics vary the US small business is estimated to employ between 43%-51% of the workforce. That’s a big number. In a Ponemon small business study dated early 2013 stated: *55 … Continue reading >>>

  • Financial Institutions Network Security Is Being Blinded!

    Written by: Francesco Trama | Published on: November 4th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Today, Financial institutions (not limited to) are being over run with security logging and alerting. Each new monitoring and alerting device adds more things to consider when evaluating threats on a daily basis. You would think this would help, and is a good thing? It is and isn’t at the same time. We bury our … Continue reading >>>

  • Kill Chain Tactics In Network Security

    Written by: Francesco Trama | Published on: November 4th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    I read a good article on Kill Chain tactics. The article subtile was: What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason I understood the thinking, just not applicable for all businesses. Below is the response I wrote. I … Continue reading >>>

  • Six Ways To Secure Yourself From Online Assailants

    Written by: Francesco Trama | Published on: November 4th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    We are now in a day of age where we have access to absolutely everything at the tip of our fingers.  With technology so advanced, we can easily check and send emails, shop, surf the web and so much more; but, this also puts a target on our back for stolen information. Have you noticed … Continue reading >>>

  • The Unavoidable “Whoops” In Network Security

    Written by: Francesco Trama | Published on: October 25th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    WE all make mistakes, its a human condition, and not curable. In network security when we make mistakes to a configuration, it’s referred to as “Fat Fingering”. I can say honestly on several occasions in my network youth, while deep into chasing false positives, on gallons of caffeine, and eyes nearly bleeding, I made mistakes. … Continue reading >>>

  • 100% of DDoS Victims Have This in Common

    Written by: Francesco Trama | Published on: October 24th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Friday’s massively disruptive DDoS attack was a sobering reminder that we’ve entered a new era of DDoS threats.  These threats require a new approach to perimeter defense. None of Friday’s victims had PacketViper.  None of PacketViper’s clients have been hit with DDoS. The cliche applies; the definition of insanity is doing the same things & expecting … Continue reading >>>

  • Outdated Medical Devices Could Mean Trouble For Patients

    Written by: Francesco Trama | Published on: October 24th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    In early October, over 100,000 diabetic patients received a notice from Johnson & Johnson that their insulin pumps are at risk of being attacked by various hackers. These hackers are now taking advantage of insulin pump devices by altering the dosage of insulin that is given to the patient.  The mistreat of insulin to any … Continue reading >>>

  • BIGGEST DDoS ATTACK TO DATE

    Written by: Francesco Trama | Published on: September 26th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Disaster struck on Tuesday, September 20, 2016, when the record for the Largest DDoS attack was broken. The assault on ‘‘Krebs on Security’’ left engineers at Akamai,the company that protects “krebsonsecurity.com”, bewildered.  Workers at Akamai watched the traffic being directed to their website drastically increase, which left engineers needing to act fast. Engineers worked endlessly … Continue reading >>>

  • Perimeter Security Myths Busted: Infographic

    Written by: Francesco Trama | Published on: July 29th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    DDoS attacks are becoming more prevalent and attackers are getting better at bombarding you with traffic that appears legitimate.  Low and slow attacks harass your network and set the stage for exfiltration.  Sound defense depends on rapid response and a strong perimeter.  A better way of defending yourself begins by rethinking the perimeter.  Check out our … Continue reading >>>

  • DNC Should Rethink the Perimeter

    Written by: Francesco Trama | Published on: July 25th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    PacketViper.  Make data safe again. The  DNC data breach by cybercriminals serves as a reminder to all of us, irrespective of political party, our online data is constantly at risk.  Availability and accessibility of the tools to conduct the type of spear-phishing attack that caused the DNC breach are at an all-time high.  Hackers hiding … Continue reading >>>

  • Will Spectators Devices Be Secure At This Year’s 2016 Summer Olympics in Rio de Janeiro?

    Written by: Francesco Trama | Published on: July 19th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    As many of you may know, in just a few short weeks, the 2016 Summer Olympics will take place in Rio de Janeiro, Brazil.  Many people will travel from all around the world to experience the best of the best compete to become an Olympic winner. With all of the athletes, spectators, and fans waiting … Continue reading >>>

  • Hackers Hiding Behind Top-Rated Security Products to Breach Our Personal Devices

    Written by: Francesco Trama | Published on: July 15th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    It is no secret that hackers are becoming more and more advanced while technology is ever evolving.  They are becoming smarter and wittier to the “traps” that top rated Government Affiliations are setting. On July 7, 2016, there was a stern warning issued to the public, made by the U.S Department of Homeland Security, in … Continue reading >>>

  • Financial Services: Your Top Firewall Weaknesses

    Written by: Francesco Trama | Published on: June 29th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Financial organizations experienced a 40 percent increase in cybercrime over the past year, with 63 percent of companies reporting daily or weekly attacks. Firewalls and other preventive cybersecurity measures take up 80 percent of your network security budget, but these solutions don’t keep up with zero-day attacks and sophisticated hackers. You face many threats your … Continue reading >>>

  • Key Network Security Challenges Faced by Financial Services and How to Solve Them

    Written by: Francesco Trama | Published on: June 27th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Financial services institutions are a primary target of cybercriminals, with valuable data and complex infrastructure creating an irresistible target for many intruders. Additionally, this industry suffers from the largest losses due to attacks, with an average cost of $13.5 million. Reputation damage from data breaches is another significant concern for 34 percent of financial services … Continue reading >>>

  • Advanced IP Filtering to Transform Healthcare Security

    Written by: Francesco Trama | Published on: June 21st, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Healthcare networks are a prime target for cybercrime. The life-saving services, data and business operations included in the healthcare model have also become quite the lucrative target for cybercriminals. Advanced IP filtering can transform healthcare security. As technology continues to evolve, innovations appear on both sides. New technologies, such as smart medical devices, mobile and … Continue reading >>>

  • Higher Ed: Network Security Challenges + How to Fix Them

    Written by: Francesco Trama | Published on: June 13th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    At today’s colleges and universities, the campus network supports a growing number of research, communications, and educational functions. But with thousands of users, endpoints, and applications active at any time, campus networks are becoming increasingly difficult to protect. Academic IT professionals are constantly challenged to ensure that all devices logging onto the network are secure, … Continue reading >>>

  • Industrial Control System Attacks: A Very Real Threat

    Written by: Francesco Trama | Published on: May 10th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    According to a report released this year by the Industrial Control Systems Cybersecurity Emergency Response Team (ICS-CERT), the number of network security attacks on industrial control systems in the United States rose by 20 percent in 2015. Security attacks on the nation’s critical infrastructure should no longer be considered just a possibility or something that … Continue reading >>>

  • How Schools Are Being Used as Phishing Attack Platforms

    Written by: Francesco Trama | Published on: May 3rd, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Schools employ many types of technology to improve the quality of education. On the surface, these technologies are helpful solutions. However, there is a commonly under-addressed concern: major cyber security vulnerabilities. IT professionals in education are the “boots on the ground” in facing these challenges. Cybersecurity concerns have a high priority among 73 percent of … Continue reading >>>

  • Attending Interop? How to Make the Most of Your Attendance

    Written by: Francesco Trama | Published on: April 28th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Headed to Vegas next week for Interop? If so, you can certainly expect an exciting, fast-paced, and deeply informative experience. That said, industry events such as Interop can be overwhelming, as there is so much to accomplish in just a few short days. I’m sure you can relate: at the beginning of the conference, it … Continue reading >>>

  • Unaddressed Cybersecurity Concerns of Small Businesses

    Written by: Francesco Trama | Published on: April 27th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Security is a major concern for all types of businesses. However, it is not uncommon for small businesses to have a number of unaddressed security issues in their environment. Unfortunately, small businesses face enterprise level security risks, without the budget. Let’s take a look at a few vulnerabilities that could affect your small business and … Continue reading >>>

  • How Spammers Use Colocation Facilities to Get To You

    Written by: Francesco Trama | Published on: April 20th, 2016

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Colocation facilities can be a controversial subject. They provide reliable hosting for companies that can’t afford or don’t want to invest in their own server, but spammers can also use them to get around the traditional Advanced-IP filters that protect companies and individuals from spam. As a network security administrator, you need to understand how … Continue reading >>>