• 3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

    Written by: Don Gray | Published on: February 3rd, 2020

    About The Author

    Don Gray
    Don Gray CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It’s time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated.

  • What is Internal and External Cyber Deception Technology?

    Written by: Francesco Trama | Published on: April 16th, 2019

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Internal and external cyber deception technology together is not your traditional approach to deception, nor to security in general. Since the days of honeypots, cybersecurity experts have utilized deception as a way to protect the network interior. Threat detection at the network perimeter, on the other hand, has seemingly been the role of firewalls. Read More…

  • Deception at the cyber “front line”

    Written by: Francesco Trama | Published on: March 19th, 2019

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Cyber Deception Front Line

    Whatever you call the front, the ability to stop the enemy where you first face them is vital. A paired approach of deception both externally and internally represents a tremendous opportunity to reduce attack vectors and strengthen overall cyber defense.

  • Four cyber deception delusions diminished

    Written by: Francesco Trama | Published on: January 17th, 2019

    About The Author

    Francesco Trama
    Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Successful adoption of cyber deception as an impactful security tool, and more than just another data generating detection solution, demands avoidance of these four common delusions. .