PacketViper Blog

Notes from the Field

Blog

The business drivers acting on OT

The business drivers acting on OT

(PART 2) This blog is part of a series about securing critical infrastructure and Operational Technology (OT) networks and systems. These systems and networks were the sole dominion of the operational, industrial, and electrical engineers who were focused on reliability and accuracy above all else.

Transform Threat Hunting

Transform Threat Hunting

Transform threat hunting into proactive threat blocking. When it comes to cybersecurity teams tend to choose solutions that create alerts about the break-ins vs. taking action to prevent it. This threat hunting scenario exemplifies how PacketViper transforms threat hunting.

Read more

Bit-and-piece DDoS threats are on the rise

Bit-and-piece DDoS threats are on the rise

Bit-and-piece attacks are rising and "more complex and deceptive" than ever. Deceiving these threats can help prevent them.

Read more

Mitigate EDoS Attacks: Creeping Normality and the Boiling Frog Fable

Mitigate EDoS Attacks: Creeping Normality and the Boiling Frog Fable

It's time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated. Learn how in this PacketViper blog.

Read more