Are you looking to learn more about Network Detection and Response? Here are the answers to some frequently asked questions we receive about NDR. Want to learn more? Contact us today to speak with a ThreatWarrior expert and see how an NDR...
Cybersecurity
Gain the insight and visibility you need to protect your hybrid enterprise
Unsupervised Neural Networks: A Big Step Forward From Today’s AI Implementations
AI has been employed within security products for decades. However, until fairly recently the vast majority of AI usage would have been predominantly underpinned by rule-based algorithms and bayesian reasoning. In the last few years, many security solution providers...
Top 5 Questions from CrowdStrike Fal.Con
Last week, ThreatWarrior attended Fal.Con 2022 live in Las Vegas to connect with cybersecurity insiders, discuss how we work with CrowdStrike to extend threat protection across the enterprise, and share why network detection and response (NDR) is critical to any...
Threat Hunting: Moving Beyond Detection and Response
In recent years, you’ve likely heard the term “threat hunting” buzzing around the cybersecurity industry. There are different ideas for what it means, different standards for what it takes to achieve, and different processes for what it looks like, though there are...
Ransomware Protection with ThreatWarrior
Ransomware is growing at an alarming rate -- up 150% in 2020 and spiking even higher in 2021, with more than half of infected businesses paying the ransom. (1) The list of high-profile ransomware attacks grows almost daily, affecting government agencies, critical...
Continuous Deep Packet Inspection vs. Traditional Packet Capture: What’s the difference?
What is Continuous Deep Packet Inspection? Continuous deep packet inspection (DPI) is a powerful technique for inspecting and filtering network traffic. DPI evaluates the packet header and contents in order to identify malware and classify traffic by application...