• Case Study: Water authority cyber-physical defense

    Written by: Ken Wolf | Published on: April 6th, 2022

    About The Author

    Ken Wolf

    A water authority conducted Red Team exercises simulating a physical breach whereby the team gained access to the network via a physical connection at a control panel at two of the unmanaged locations. The result was a success with PacketViper protecting the critical operations network, blocking the attacker’s ability to further penetrate the network while alerting operators of the attack.

  • A Compensating Control for the Vanishing Air Gap

    Written by: Don Gray | Published on: April 28th, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Operational technology (OT) networks are becoming more connected to IT environments. As such, the once dependable ‘air gap’ protection between IT and OT no longer exists. This creates cyber risk that can result in substantial financial losses, the disruption of essential services, and possibly affect national security and public welfare. For organizations relying on OT, … Continue reading >>>

  • Download PacketViper’s Ransomware Use Case for OT and IT

    Written by: Don Gray | Published on: February 23rd, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Ransomware Image for PacketViper Use Case to Harden OT Security Without Risking Downtime

    Ransomware is on the rise and the increasing convergence of information technology (IT) and operational technology (OT) networks creates new pathways for attackers into coveted OT environments. As connected OT networks become more accessible to threat actors of all motivations, security teams need to look at more pragmatic ways to harden OT security without the … Continue reading >>>