Analytics

SS8 BreachDetect Streamlined Dashboard

Welcome to our Improved BreachDetect Dashboard

Published on February 17th, 2017 | by Joel Roy

Analysts — how is your breach detection workflow? Do you struggle to sift through reports to find insights into suspicious network activity? If you’re like most security pros, chances are you’d benefit from a system which... Read More


News

Breach of the Month — January 2017

Published on February 3rd, 2017 | by Akshay Nayak

While everyone likes to win, this is an award you don’t want. Each week we choose a breach as our #breachoftheweek for our Twitter stream, and those become nominees for SS8’s “Breach of The Month”. Think... Read More


Events

Doubling-Down on Breach Detection at RSA 2017

Published on February 1st, 2017 | by Tony Thompson

It’s that time of year again, the time when the cybersecurity industry convenes in San Francisco for the annual RSA Conference. What’s not to love if you’re a security pro: lots of top tech in one... Read More


Podcast

Breach Happens Podcast #4 – Packet Recorders

Published on January 26th, 2017 | by Joel Roy

In Episode Four of the Breach Happens podcast, SS8 Sales Engineer Andrew Weisman joins host Tony Thompson to discuss the good, the bad, and the ugly of packet recorder technology. Come join the conversation! Follow us on... Read More


Cyber Security

Help Wanted: Packet Inspection Capabilities

Published on January 19th, 2017 | by Andrew Weisman

Help wanted: A security tool that understands packets, gives full network visibility and hunts for breaches. Must be easy-to-use and work well with others. Willing to work nights, weekends and holidays. Sure, I’m being a bit... Read More


Podcast

Breach Happens Podcast #3 – 2016 Threat Rewind Report

Published on January 13th, 2017 | by Joel Roy

In Episode Three of the Breach Happens podcast, SS8 COO and President Faizel Lakhani joins host Tony Thompson to discuss and review the findings in the recently released 2016 Threat Rewind Report. Key themes include bittorrent, traffic... Read More


Analytics

I.O.T Phone Home: Network Security in the age of the Internet of Things

I.O.T. Phone Home

Published on January 12th, 2017 | by Joel Roy

The creation of our 2016 Threat Rewind Report, which we released last month, was intended to help educate and better-prepare today’s enterprises about the most sophisticated attack techniques hiding in today’s networks and evading preventative cybersecurity... Read More


Back to Top ↑