by Rob Lancaster | Dec 10, 2020 | Best Practices, Cloud Security
Many enterprises today are built on a hybrid or multi-cloud architecture, and the rising demand for cybersecurity solutions that can protect these cloud infrastructures has grown exponentially. However, some vendors still focus security efforts only on certain...
by Jon Rubin | Nov 14, 2020 | Cybersecurity, Deep Packet Inspection
What is Continuous Deep Packet Inspection? Continuous deep packet inspection (DPI) is a powerful technique for inspecting and filtering network traffic. DPI evaluates the packet header and contents in order to identify malware and classify traffic by application...
by Pete Slade | May 13, 2020 | Critical Infrastructure
Cyberattacks involving Internet of Things (IoT) devices are surging at an unprecedented rate. Our hyper-connectivity and reliance on IoT devices provide myriad conveniences, but they also create cybersecurity blind spots across consumer markets and enterprises. IoT...
by Pete Slade | Nov 7, 2018 | Threats
The Russian cyber attack on the 2016 Presidential Election has brought cybersecurity to the forefront. Regardless of which industry you’re in, that attack made it abundantly clear we’re all at risk of cyber breaches. But don’t kid yourself – it isn’t just foreign...
by Pete Slade | Sep 11, 2018 | Best Practices
When we entered the world of cybersecurity a couple of years ago, we considered software agents as a method of delivery for our solution. However, we quickly rejected this approach for a number of reasons and we believe it’s an unsuitable technique for effective cyber...