PacketViper Blog

Notes from the Field

Blog

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

Attackers rely on proxies because they work. What if you could make proxies work against them? Well, you can, using deception at your network edge.

PacketViper Named to Carahsoft Contract to Support U.S. Army Cybersecurity

PacketViper Named to Carahsoft Contract to Support U.S. Army Cybersecurity

PacketViper today announced that it has been named a manufacturer on the Information Technology Enterprise Solutions - Software 2 (ITES-SW2) contract held by Carahsoft for the U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS).

Read more

Transform Threat Hunting

Transform Threat Hunting

Transform threat hunting into proactive threat blocking. When it comes to cybersecurity teams tend to choose solutions that create alerts about the break-ins vs. taking action to prevent it. This threat hunting scenario exemplifies how PacketViper transforms threat hunting.

Read more

Bit-and-piece DDoS threats are on the rise

Bit-and-piece DDoS threats are on the rise

Bit-and-piece attacks are rising and "more complex and deceptive" than ever. Deceiving these threats can help prevent them.

Read more