Published on January 13th, 2017 | by Joel Roy
In Episode Three of the Breach Happens podcast, SS8 COO and President Faizel Lakhani joins host Tony Thompson to discuss and review the findings in the recently released 2016 Threat Rewind Report. Key themes include bittorrent, traffic... Read More →
Published on January 12th, 2017 | by Joel Roy
The creation of our 2016 Threat Rewind Report, which we released last month, was intended to help educate and better-prepare today’s enterprises about the most sophisticated attack techniques hiding in today’s networks and evading preventative cybersecurity... Read More →
Published on December 21st, 2016 | by Joel Roy
It’s not you, it’s me. Well, it is you NetFlow. We’ve had some good times, but I don’t feel like you’re meeting my needs anymore. So I think it’s time we broke up. In Episode Two... Read More →
Published on December 15th, 2016 | by Tony Thompson
Over the past year, SS8 has conducted breach detection risk assessments on live production networks, using the SS8 BreachDetect platform, for companies in key industries including critical infrastructure, retail, and education. We’ve analyzed a whopping five billion... Read More →
Published on December 7th, 2016 | by Tony Thompson
Forrester recently published its Vendor Landscape: Security Analytics (SA)1] report, and there’s one theme we believe resonates more than any: Network visibility and insight is key to responding quickly to breaches that have slipped past your... Read More →
Published on November 16th, 2016 | by Tony Thompson
While many enterprise organizations are now relying on log data to answer the what, when, how, and why of a breach, the reality is that despite your team’s best efforts, more advanced threats will still slip... Read More →
Published on November 9th, 2016 | by Tony Thompson
It’s no secret that the network is the key to finding breaches. 99% of breaches still occur over the network despite our best efforts to prevent them. When a breach slips onto the network, the best... Read More →
Published on November 2nd, 2016 | by Tony Thompson
Can you say with certainty that you have an automated workflow that finds breaches for you and even does the work of finding the devices on your network that may have been compromised? SS8 BreachDetect is... Read More →
Published on October 25th, 2016 | by Tony Thompson
With regulatory agencies issuing cybersecurity mandates and guidelines requiring an ability to detect and manage threats, businesses need to take threat detection measures seriously. But companies today are frustrated with the cost and complexity of the... Read More →
Published on October 21st, 2016 | by Joel Roy
We built the Breach Happens Podcast to provide insight into and pull back the curtain on why and how exactly everyone is getting breached. If you are interested in data breaches and network cyber security, you’ll... Read More →