SS8, Inc.

Category: Content
Type: Blog Article

Generated 4 days ago

New blog articles detected

  • SS8 BreachDetect Uncovers Breaches without Forensics Expertise

    We have introduced the latest version of BreachDetect, which makes advanced threat detection and investigation capabilities easily accessible to enterprise security and IT administrators. This latest release of BreachDetect tilts the balance in favor of enterprises with an intelligence-agency grade solution for detecting the most advanced threats, without the need for security analyst training. Wa...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Visualizing the Kill Chain without Forensics Expertise

    Two things we should all know by now: attacks continue to hit our networks despite preventative defenses, and there’s a shortage of resources available to hunt them down. That changes today with the latest release of BreachDetect, our time machine for breach detection, which makes advanced threat detection and investigation capabilities easily accessible to enterprise [&hellip The post Visualizing...

  • Breach Happens Podcast #5 – January’s Breach of the Month

    In Episode Five of the Breach Happens podcast, SS8 Threat Analyst Akshay Nayak joins host Tony Thompson to choose our Breach of the Month winner for January 2017. You can help us nominate breaches throughout the month using the hashtag #breachoftheweek. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag #breachhappens [&hellip The post Breach Happens Podcas...

  • Breach of the Month — January 2017

    While everyone likes to win, this is an award you don’t want. Each week we choose a breach as our #breachoftheweek for our Twitter stream, and those become nominees for SS8’s “Breach of The Month”. Think of it as our team’s very own Raspberry Awards!  Analyses of the Breach of the Week winners are provided [&hellip The post Breach of the Month — January 2017 appeared first on Breacher Report.

SS8, Inc.

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Breach Happens Podcast #4 – Packet Recorders

    In Episode Four of the Breach Happens podcast, SS8 Sales Engineer Andrew Weisman joins host Tony Thompson to discuss the good, the bad, and the ugly of packet recorder technology. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag #breachhappens — we’d love to hear your thoughts. Listen to the [&hellip The post Breach Happens Podcast #4 – Packet Recorders a...

  • Help Wanted: Packet Inspection Capabilities

    Help wanted: A security tool that understands packets, gives full network visibility and hunts for breaches. Must be easy-to-use and work well with others. Willing to work nights, weekends and holidays. Sure, I’m being a bit cheeky here, but when you think about 99% of bad things being seen on the network, the need for [&hellip The post Help Wanted: Packet Inspection Capabilities appeared first on...

  • Breach Happens Podcast #3 – 2016 Threat Rewind Report

    In Episode Three of the Breach Happens podcast, SS8 COO and President Faizel Lakhani joins host Tony Thompson to discuss and review the findings in the recently released 2016 Threat Rewind Report. Key themes include bittorrent, traffic tunneling, and non–essential devices. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag [&hellip The post Breach Happens P...

  • I.O.T. Phone Home

    The creation of our 2016 Threat Rewind Report, which we released last month, was intended to help educate and better-prepare today’s enterprises about the most sophisticated attack techniques hiding in today’s networks and evading preventative cybersecurity defenses. Over the past year, SS8 has conducted breach detection risk assessments on live production networks, using the SS8 BreachDetect [&he...

  • Breach Happens Podcast #2 – Dear Netflow…

    It’s not you, it’s me. Well, it is you NetFlow. We’ve had some good times, but I don’t feel like you’re meeting my needs anymore. So I think it’s time we broke up. In Episode Two of the BreachHappens podcast, NetFlow tries hard to get a security analyst back, but she’s moved on and lets [&hellip The post Breach Happens Podcast #2 – Dear Netflow… appeared first on Breacher Report.

  • Top Cyber Security Evasion and Exfiltration Techniques Exposed

    Over the past year, SS8 has conducted breach detection risk assessments on live production networks, using the SS8 BreachDetect platform, for companies in key industries including critical infrastructure, retail, and education. We’ve analyzed a whopping five billion high-definition records (HDRs) from a variety of environments, and from that, have now published what we refer to as [&hellip The pos...

  • Forrester Spotlights Security Analytics Vendor Landscape

    Forrester recently published its Vendor Landscape: Security Analytics (SA)[1] report, and there’s one theme we believe resonates more than any: Network visibility and insight is key to responding quickly to breaches that have slipped past your preventative measures. (If you’re a Forrester client, you can download the full report here.) According to the report, authored [&hellip The post Forrester ...

  • Not So SIEMple: 3 Things to Keep in Mind Before Falling into SIEM Reliance

    While many enterprise organizations are now relying on log data to answer the what, when, how, and why of a breach, the reality is that despite your team’s best efforts, more advanced threats will still slip past traditional preventative security tools and can hide on the network for an average of 200 days. This makes [&hellip The post Not So SIEMple: 3 Things to Keep in Mind Before Falling into S...

  • Breach Hunting: Simplified

    It’s no secret that the network is the key to finding breaches. 99% of breaches still occur over the network despite our best efforts to prevent them. When a breach slips onto the network, the best way to catch it quickly is with total network visibility. SS8 BreachDetect employs this concept to give you a [&hellip The post Breach Hunting: Simplified appeared first on Breacher Report.

  • Doubling-Down on Breach Detection at RSA 2017

    It’s that time of year again, the time when the cybersecurity industry convenes in San Francisco for the annual RSA Conference. What’s not to love if you’re a security pro: lots of top tech in one place, surrounded by peers you can learn from, security leaders sharing ideas, and of course, the parties. It shouldn’t [&hellip The post Doubling-Down on Breach Detection at RSA 2017 appeared first on B...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 4 months ago

New blog articles detected

  • HDRs optimize Rule-Based and Machine Learning Classification of Network Breaches

    SS8 has developed High-Definition Records (HDRs) as an answer to the lack of total network visibility that most enterprises face today. These HDRs provide more detailed information than NetFlow records by adding Application Level Metadata, such as the “To:” or “From:” field in an email to the record, and even include User Identity information. High-Definition [&hellip The post HDRs optimize Rule-B...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • Advising the Commission on Enhancing National Cybersecurity: Isn’t it all about the Network?

    The Commission on Enhancing National Cybersecurity (Executive Order 13718) has requested information about current and future states of cybersecurity in the digital economy. The Commission solicited input through a public Request for Information, and SS8 has recently provided our comments. This is a notable effort, and we thank the Commission for taking our comments. In [&hellip The post Advising ...

  • Time for a Defensive Change in Cyber

    Today’s post was written by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T, Present CEO, TAG Cyber One of the conundrums facing the modern enterprise security team involves what to do about the ineffectiveness of the perimeter. Everyone agrees that unauthorized entry through open ports or advertised services in a leaky firewall has [&hellip The post Time for a Defensive Change in Cyber appeared...

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in