• PacketViper Presents CyberTalk360

    Written by: Ken Wolf | Published on: August 20th, 2021

    About The Author

    Ken Wolf

    PacketViper presents CyberTalk360, a 15-minute webinar series about all things cybersecurity. 2021 presents a multitude of cybersecurity challenges. It’s challenging to sort through the clutter and make sense of it all. That’s why we’re launching this webinar. Each month our team will get together to dig into the latest news, issues and newsworthy cybersecurity topics. … Continue reading >>>

  • A Compensating Control for the Vanishing Air Gap

    Written by: Don Gray | Published on: April 28th, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Operational technology (OT) networks are becoming more connected to IT environments. As such, the once dependable ‘air gap’ protection between IT and OT no longer exists. This creates cyber risk that can result in substantial financial losses, the disruption of essential services, and possibly affect national security and public welfare. For organizations relying on OT, … Continue reading >>>

  • Download PacketViper’s Ransomware Use Case for OT and IT

    Written by: Don Gray | Published on: February 23rd, 2021

    About The Author

    Don Gray
    CTO Don Gray is responsible for the continued development of the PacketViper technology roadmap, harnessing his extensive experience in cybersecurity software strategy and technology development. Previously Don contributed to blogs and threat intelligence reports for NTT Security (formerly Solutionary).

    Ransomware Image for PacketViper Use Case to Harden OT Security Without Risking Downtime

    Ransomware is on the rise and the increasing convergence of information technology (IT) and operational technology (OT) networks creates new pathways for attackers into coveted OT environments. As connected OT networks become more accessible to threat actors of all motivations, security teams need to look at more pragmatic ways to harden OT security without the … Continue reading >>>