PacketViper Blog

Notes from the Field

Blog

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

Attackers rely on proxies because they work. What if you could make proxies work against them? Well, you can, using deception at your network edge.

NIST gets down with Deception

NIST gets down with Deception

NIST recommends Deception technology. Review the most recent NIST publications and learn how PacketViper protects high-value assets with Deception.

Read more

Build a Business Case for Deception Technology

Build a Business Case for Deception Technology

Deception, an emerging technology, aligns with a core goal of NCSAM - to secure and protect critical data and infrastructure. These three use cases build a business case.

Read more

Deception Gets Screen Time at Gartner Security Risk and Management Summit 2019

Deception Gets Screen Time at Gartner Security Risk and Management Summit 2019

Gartner Security and Risk Management Summit 2019 recap by Don Gray highlights deception in keynote presentation, the 7 imperatives of CARTA, and DevSecOps.

Read more