Insights
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy.
SolarWinds and Qualys Attacks: Why You Need Digital Supply Chain Protection
The SolarWinds attack was a pivotal moment for cybersecurity, proving that sophisticated threat actors could breach an organization through their trusted security supply chain. (1) The recent Qualys attack -- in which cybersecurity firm Qualys suffered a data breach...
Enhance Cybersecurity by Leveraging Google Packet Mirroring in ThreatWarrior
Many enterprises today are built on a hybrid or multi-cloud architecture, and the rising demand for cybersecurity solutions that can protect these cloud infrastructures has grown exponentially. However, some vendors still focus security efforts only on certain...
Unsupervised Neural Networks Explained: What Are They and How Do They Work?
We’ve all heard the buzzwords – artificial intelligence, machine learning, supervised and unsupervised neural networks, network detection and response, etc. – flying around the tech industry. In the world of IT, there’s never a shortage of these buzzwords, but they’re...
ThreatWarrior: Design Principles
At ThreatWarrior, we often collaborate on key projects. One that requires us to be aligned internally is our thinking on the core elements of our product strategy, or our design principles. First and foremost, everything we do as a company has one bottom-line...
Continuous Deep Packet Inspection vs. Traditional Packet Capture: What’s the difference?
What is Continuous Deep Packet Inspection? Continuous deep packet inspection (DPI) is a powerful technique for inspecting and filtering network traffic. DPI evaluates the packet header and contents in order to identify malware and classify traffic by application...
Cybersecurity & Network Detection and Response in the Age of Connected Things
Cyberattacks involving Internet of Things (IoT) devices are surging at an unprecedented rate. Our hyper-connectivity and reliance on IoT devices provide myriad conveniences, but they also create cybersecurity blind spots across consumer markets and enterprises. IoT...