Podcast

Breach Happens Podcast #4 – Packet Recorders

Published on January 26th, 2017 | by Joel Roy

In Episode Four of the Breach Happens podcast, SS8 Sales Engineer Andrew Weisman joins host Tony Thompson to discuss the good, the bad, and the ugly of packet recorder technology. Come join the conversation! Follow us on... Read More


Cyber Security

Help Wanted: Packet Inspection Capabilities

Published on January 19th, 2017 | by Andrew Weisman

Help wanted: A security tool that understands packets, gives full network visibility and hunts for breaches. Must be easy-to-use and work well with others. Willing to work nights, weekends and holidays. Sure, I’m being a bit... Read More


Podcast

Breach Happens Podcast #3 – 2016 Threat Rewind Report

Published on January 13th, 2017 | by Joel Roy

In Episode Three of the Breach Happens podcast, SS8 COO and President Faizel Lakhani joins host Tony Thompson to discuss and review the findings in the recently released 2016 Threat Rewind Report. Key themes include bittorrent, traffic... Read More


Analytics

I.O.T Phone Home: Network Security in the age of the Internet of Things

I.O.T. Phone Home

Published on January 12th, 2017 | by Joel Roy

The creation of our 2016 Threat Rewind Report, which we released last month, was intended to help educate and better-prepare today’s enterprises about the most sophisticated attack techniques hiding in today’s networks and evading preventative cybersecurity... Read More


Podcast

Breach Happens Cybersecurity Podcast

Breach Happens Podcast #2 – Dear Netflow…

Published on December 21st, 2016 | by Joel Roy

It’s not you, it’s me. Well, it is you NetFlow. We’ve had some good times, but I don’t feel like you’re meeting my needs anymore. So I think it’s time we broke up. In Episode Two... Read More


Analytics

Forrester Spotlights Security Analytics Vendor Landscape

Published on December 7th, 2016 | by Sanjana Chand

Forrester recently published its Vendor Landscape: Security Analytics (SA)1] report, and there’s one theme we believe resonates more than any: Network visibility and insight is key to responding quickly to breaches that have slipped past your... Read More


Cyber Security

Breach Hunting: Simplified

Published on November 9th, 2016 | by Sanjana Chand

It’s no secret that the network is the key to finding breaches. 99% of breaches still occur over the network despite our best efforts to prevent them. When a breach slips onto the network, the best... Read More


Cyber Security

Introduction to the BreachDetect UI

Published on November 2nd, 2016 | by Sanjana Chand

Can you say with certainty that you have an automated workflow that finds breaches for you and even does the work of finding the devices on your network that may have been compromised? SS8 BreachDetect is... Read More


Back to Top ↑