• A Compensating Control for the Vanishing Air Gap

    Written by: Don Gray | Published on: April 28th, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Operational technology (OT) networks are becoming more connected to IT environments. As such, the once dependable ‘air gap’ protection between IT and OT no longer exists. This creates cyber risk that can result in substantial financial losses, the disruption of essential services, and possibly affect national security and public welfare. For organizations relying on OT, … Continue reading >>>

  • Download PacketViper’s Ransomware Use Case for OT and IT

    Written by: Don Gray | Published on: February 23rd, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Ransomware Image for PacketViper Use Case to Harden OT Security Without Risking Downtime

    Ransomware is on the rise and the increasing convergence of information technology (IT) and operational technology (OT) networks creates new pathways for attackers into coveted OT environments. As connected OT networks become more accessible to threat actors of all motivations, security teams need to look at more pragmatic ways to harden OT security without the … Continue reading >>>

  • Transform Threat Hunting

    Written by: Francesco Trama | Published on: November 11th, 2020

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    into proactive threat hunting

    How can you transform threat hunting? Consider this home security scenario: Imagine you have a choice of two home security systems: The first one only alerts you about intruders after they have broken into your house. The second one works when the threat is on your front lawn and keeps it away. Which do you … Continue reading >>>

  • 3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

    Written by: Don Gray | Published on: February 3rd, 2020

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

      Heightened geopolitical tensions led to a recent warning from CISA on strengthening cyber defenses in anticipation of increased nation-state cyber attacks.  While we know the specific nation-states we are most concerned with, targeting defenses against them is tricky. Attackers have abundant resources to wage dynamic, persistent attacks. Unfortunately, common cyber defense solutions are typically … Continue reading >>>

  • It’s time to take a different approach to utilizing threat intelligence

    Written by: Don Gray | Published on: September 25th, 2018

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    network defense

    Threat Intelligence has gotten a lot of attention in the last few years. What is it? Who understands it? Is it actionable?  Plus think about the substantial investment for security organizations to create such a perishable good and then actually using it to protect a network can be complicated. Don’t forget the numerous reports about … Continue reading >>>

  • Threat Intelligence: Past performance does not indicate future results

    Written by: Francesco Trama | Published on: May 9th, 2017

    About The Author

    Francesco Trama
    As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

    Most investors have seen the disclaimer, “Past performance is not indicative of future results.”  Network security professionals should have this in mind while considering threat intelligence as a foundational element for security strategies. The rapidly and ever-changing threat landscape makes the value of historical threat intelligence alone in predicting cyber attacks uncertain and the attacker’s … Continue reading >>>