Thought Leadership
Intelligence to help you deliver successful cybersecurity outcomes to your organization.
Enhance Cybersecurity by Leveraging Google Packet Mirroring in ThreatWarrior
Many enterprises today are built on a hybrid or multi-cloud architecture, and the rising demand for cybersecurity solutions that can protect these cloud infrastructures has grown exponentially. However, some vendors still focus security efforts only on certain...
Unsupervised Neural Networks Explained
We’ve all heard the buzzwords – artificial intelligence, machine learning, supervised and unsupervised neural networks, etc. – flying around the tech industry. In the world of IT, there’s never a shortage of these buzzwords, but they’re oftentimes used incorrectly and...
ThreatWarrior: Design Principles
At ThreatWarrior, we often collaborate on key projects. One that requires us to be aligned internally is our thinking on the core elements of our product strategy, or our design principles. First and foremost, everything we do as a company has one bottom-line...
Cybersecurity in the Age of Connected Things
Cyberattacks involving Internet of Things (IoT) devices are surging at an unprecedented rate. Our hyper-connectivity and reliance on IoT devices provide myriad conveniences, but they also create cybersecurity blind spots across consumer markets and enterprises. IoT...
Deconstructing Vendor AI Exaggerations
Artificial intelligence and machine learning are guiding research, accelerating product development, improving security and more across numerous industries including our nation’s most critical infrastructures. However, many vendors camouflage true capabilities through...
Cyberspace Solarium Commission Recommends US Cybersecurity Overhaul
The Cyberspace Solarium Commission (CSC) has released a report that suggests US cybersecurity policy is in need of drastic changes. The 182-page report is the result of a yearlong congressional study led by a bipartisan group of lawmakers. It calls for a policy...