by Rob Lancaster | Dec 10, 2020 | Best Practices, Cloud Security
Many enterprises today are built on a hybrid or multi-cloud architecture, and the rising demand for cybersecurity solutions that can protect these cloud infrastructures has grown exponentially. However, some vendors still focus security efforts only on certain...
by Jon Rubin | Dec 8, 2020 | Machine Learning
We’ve all heard the buzzwords – artificial intelligence, machine learning, supervised and unsupervised neural networks, network detection and response, etc. – flying around the tech industry. In the world of IT, there’s never a shortage of these buzzwords, but they’re...
by Rob Lancaster | Nov 23, 2020 | Best Practices
At ThreatWarrior, we often collaborate on key projects. One that requires us to be aligned internally is our thinking on the core elements of our product strategy, or our design principles. First and foremost, everything we do as a company has one bottom-line...
by Jon Rubin | Nov 14, 2020 | Cybersecurity, Deep Packet Inspection
What is Continuous Deep Packet Inspection? Continuous deep packet inspection (DPI) is a powerful technique for inspecting and filtering network traffic. DPI evaluates the packet header and contents in order to identify malware and classify traffic by application...
by Pete Slade | Dec 13, 2018 | Best Practices
There are numerous challenges to building and managing an information security program. Organizations need to comply with industry regulations, state directives and even international statutes in some cases. Cybersecurity frameworks offer a way to address your cyber...