• 3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

    Written by: Don Gray | Published on: February 3rd, 2020

    About The Author

    Don Gray
    Don Gray CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It’s time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated.

  • Omaha Data Connector

    Written by: Sara Sims | Published on: September 4th, 2019

    About The Author

    Sara Sims

    Darta Connector

    Join us at the Omaha Cybersecurity Conference on Oct. 24. The one-day conference features a Keynote Speaker Session plus 8-10 additional educational speaker sessions discussing current cybersecurity threats and solutions.

  • Gartner Research Cites PacketViper

    Published on: June 11th, 2019

    About The Author

    Sara Sims


    Five use cases and key findings published in Gartner research, Improve Your Threat Detection Function With Deception Technologies. Additional use cases described for Deception360 which utilizes Internal and External Deception.