PacketViper Blog

Notes from the Field

Blog

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

Attackers rely on proxies because they work. What if you could make proxies work against them? Well, you can, using deception at your network edge.

FOR SALE: A much smaller cybersecurity haystack

FOR SALE:  A much smaller cybersecurity haystack

Review the cybersecurity burden-cycle of organizations this budget season. Find a new way to reduce the haystack and decrease security budget needs.

Read more

It's time to take a different approach to utilizing threat intelligence

One of the biggest opportunities for security teams today is to reduce the operational burden and cost of security with threat intelligence and PacketViper.

Read more