by Jon Rubin | Jul 6, 2021 | Breaches, Cybersecurity
Ransomware is growing at an alarming rate — up 150% in 2020 and spiking even higher in 2021, with more than half of infected businesses paying the ransom. (1) The list of high-profile ransomware attacks grows almost daily, affecting government agencies, critical...
by Jon Rubin | May 13, 2021 | Breaches, Critical Infrastructure
The Colonial Pipeline ransomware attack exposed long-standing vulnerabilities in U.S. cybersecurity: the government and private sector have struggled to work together to build more resilient defenses, and outdated security models have made it difficult for the federal...
by Jon Rubin | Dec 8, 2020 | Machine Learning
We’ve all heard the buzzwords – artificial intelligence, machine learning, supervised and unsupervised neural networks, network detection and response, etc. – flying around the tech industry. In the world of IT, there’s never a shortage of these buzzwords, but they’re...
by Jon Rubin | Nov 14, 2020 | Cybersecurity, Deep Packet Inspection
What is Continuous Deep Packet Inspection? Continuous deep packet inspection (DPI) is a powerful technique for inspecting and filtering network traffic. DPI evaluates the packet header and contents in order to identify malware and classify traffic by application...
by Jon Rubin | Sep 10, 2018 | Machine Learning
Artificial intelligence is an exciting and innovative technology. Cybersecurity is technology’s biggest problem, so it’s natural to apply the former to the latter. It’s also natural, then, that every cybersecurity company claims to use AI. However, most of those...