Cyber Security

Breach Hunting: Simplified

Published on November 9th, 2016 | by Sanjana Chand

It’s no secret that the network is the key to finding breaches. 99% of breaches still occur over the network despite our best efforts to prevent them. When a breach slips onto the network, the best... Read More


Cyber Security

Introduction to the BreachDetect UI

Published on November 2nd, 2016 | by Sanjana Chand

Can you say with certainty that you have an automated workflow that finds breaches for you and even does the work of finding the devices on your network that may have been compromised? SS8 BreachDetect is... Read More


Cyber Security

Managed Detection and Response, with a Rewind Button

Published on October 25th, 2016 | by Tony Thompson

With regulatory agencies issuing cybersecurity mandates and guidelines requiring an ability to detect and manage threats, businesses need to take threat detection measures seriously. But companies today are frustrated with the cost and complexity of the... Read More


Podcast

Breach Happens Cybersecurity Podcast

Introducing the Breach Happens Podcast

Published on October 21st, 2016 | by Joel Roy

We built the Breach Happens Podcast to provide insight into and pull back the curtain on why and how exactly everyone is getting breached. If you are interested in data breaches and network cyber security, you’ll... Read More


Cyber Security

the Future of Incident Response - Webinar

Upcoming Webinar: The Future of Incident Response

Published on October 12th, 2016 | by Sanjana Chand

Improving Enterprise Incident Response What happens when you combine increasingly effective adversaries, data dispersing to the cloud, and a significant lack of skilled security practitioners? More breaches, and more problems. We’ve found ourselves in the middle... Read More


APT

Network Visibility Yahoo

Lack of Network Visibility May Have Killed Yahoo

Published on September 29th, 2016 | by Raj Wadhwa

Yahoo Inc. recently confirmed that a copy of user information was stolen from their network sometime in the latter part of 2014. While not a lot of information is available on how exactly the breach may... Read More


Back to Top ↑