SS8, Inc.

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • Network Ports can be Risky Business

    Network ports are entry points into your system, and understanding network infrastructure and hosted services helps to determine the ports that are expected to be open on the network. Any listening port that is unexpectedly open in your environment is a potential attack vector; that being said, adversaries have managed to interact over common ports [&hellip The post Network Ports can be Risky Busi...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • Taking OpenCandy from a Baby

    It’s always amazing to see what we uncover during an SS8 BreachDetect risk assessment. BreachDetect was recently deployed in a customer’s environment to analyze network traffic, detect previously unknown threats and pinpoint any compromised devices-of-interest. What did SS8 BreachDetect Find? SS8 BreachDetect discovered numerous internal devices with active participation in an OpenCandy Adware Net...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Breach of the Month — March 2017

    If you follow the SS8 Twitter feed, you’ll know that every Friday we select a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. But we also select from these ‘finalists’ to choose a single outstanding breach each month — which was the one we chose as the March #breachofthemonth? This month’s [&hellip The post Breach of the Month — March 2017 appeared first on Breacher Report.

SS8, Inc.

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • Focusing on the Evolving Threat Landscape at SecureCISO

    Most companies list cyber security as one of their top priorities. Many have implemented various technologies and increased headcount to protect their digital assets and comply with regulations. However, despite making these investments, they continue to struggle with identifying a breach and knowing what to do or how to respond when it happens. Today, SS8 [&hellip The post Focusing on the Evolvin...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Blacklisted Shell Games

    It’s always amazing to see what we uncover during an SS8 BreachDetect risk assessment. BreachDetect was recently deployed in the customer’s environment to analyze network traffic, detect previously unknown threats and pinpoint any compromised devices-of-interest. What Did SS8 BreachDetect Uncover? One of the key discoveries uncovered was: SSH Sessions from blacklisted threat actors SS8 BreachDetec...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Breach of the Month — February 2017

    Every week on our Twitter stream we share news on the top breaches making the headlines. At the end of each week one ‘unlucky winner’ — the largest, the weirdest, the most dangerous, or the most high-profile — is chosen as the SS8 #breachoftheweek. But out of all the February breaches we chose for the [&hellip The post Breach of the Month — February 2017 appeared first on Breacher Report.

SS8, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Forrester’s Vendor Landscape: Security Analytics Report Shows Security Logs Aren’t Enough

    According to Forrester’s most recent Vendor Landscape: Security Analytics (SA) report, “SA solutions promise to detect cyber threats and enable security teams to respond before they cause a data breach.” As outside threats continue to evolve, it’s no longer enough for Security Information Management tools to simply log events — increasing pressure on enterprise security [&hellip The post Forrester...

  • RSAC 2017 – a View from the Floor

    The 2017 RSA Conference showcased almost 500 security companies proposing elegant solutions to solve a plethora of problems across different domains of security, including web application security, network attacks, data forensics, malware and APTs, encryption key management, risk and crisis management, and biometrics. The entire conference was massive, taking place over 5 days with venues [&hellip...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Threat, Breach, Risk… Watch The SS8 RSA 2017 Recap

    The SS8 team is still fired up from our great experiences at the 2017 RSA conference last week. In this video recap, SS8 president and COO Faizel Lakhani discusses the trends and findings from one of the cybersecurity industry’s top events. He examines the challenges enterprises face today and how the network is critical to [&hellip The post Threat, Breach, Risk… Watch The SS8 RSA 2017 Recap appea...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • The Hello Kitty Data Breach – a Deeper Look

    Earlier this month we chose the Hello Kitty breach as the ‘winner’ of 2017’s first Breach of the Month. Why did we choose this particular data leak from the other January contenders? We’d like to outline the 2 major reasons we selected this particular breach: the nature of the data stolen, and some of the [&hellip The post The Hello Kitty Data Breach – a Deeper Look appeared first on Breacher Repo...

  • Welcome to our Improved BreachDetect Dashboard

    Analysts — how is your breach detection workflow? Do you struggle to sift through reports to find insights into suspicious network activity? If you’re like most security pros, chances are you’d benefit from a system which allows you to quickly sort through key threat indicators to find detailed information on any surfacing indicators of compromise. [&hellip The post Welcome to our Improved BreachD...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • SS8 BreachDetect Uncovers Breaches without Forensics Expertise

    We have introduced the latest version of BreachDetect, which makes advanced threat detection and investigation capabilities easily accessible to enterprise security and IT administrators. This latest release of BreachDetect tilts the balance in favor of enterprises with an intelligence-agency grade solution for detecting the most advanced threats, without the need for security analyst training. Wa...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Visualizing the Kill Chain without Forensics Expertise

    Two things we should all know by now: attacks continue to hit our networks despite preventative defenses, and there’s a shortage of resources available to hunt them down. That changes today with the latest release of BreachDetect, our time machine for breach detection, which makes advanced threat detection and investigation capabilities easily accessible to enterprise [&hellip The post Visualizing...

  • Breach Happens Podcast #5 – January’s Breach of the Month

    In Episode Five of the Breach Happens podcast, SS8 Threat Analyst Akshay Nayak joins host Tony Thompson to choose our Breach of the Month winner for January 2017. You can help us nominate breaches throughout the month using the hashtag #breachoftheweek. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag #breachhappens [&hellip The post Breach Happens Podcas...

  • Breach of the Month — January 2017

    While everyone likes to win, this is an award you don’t want. Each week we choose a breach as our #breachoftheweek for our Twitter stream, and those become nominees for SS8’s “Breach of The Month”. Think of it as our team’s very own Raspberry Awards!  Analyses of the Breach of the Week winners are provided [&hellip The post Breach of the Month — January 2017 appeared first on Breacher Report.

SS8, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Breach Happens Podcast #4 – Packet Recorders

    In Episode Four of the Breach Happens podcast, SS8 Sales Engineer Andrew Weisman joins host Tony Thompson to discuss the good, the bad, and the ugly of packet recorder technology. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag #breachhappens — we’d love to hear your thoughts. Listen to the [&hellip The post Breach Happens Podcast #4 – Packet Recorders a...

  • Help Wanted: Packet Inspection Capabilities

    Help wanted: A security tool that understands packets, gives full network visibility and hunts for breaches. Must be easy-to-use and work well with others. Willing to work nights, weekends and holidays. Sure, I’m being a bit cheeky here, but when you think about 99% of bad things being seen on the network, the need for [&hellip The post Help Wanted: Packet Inspection Capabilities appeared first on...

  • Breach Happens Podcast #3 – 2016 Threat Rewind Report

    In Episode Three of the Breach Happens podcast, SS8 COO and President Faizel Lakhani joins host Tony Thompson to discuss and review the findings in the recently released 2016 Threat Rewind Report. Key themes include bittorrent, traffic tunneling, and non–essential devices. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag [&hellip The post Breach Happens P...

  • I.O.T. Phone Home

    The creation of our 2016 Threat Rewind Report, which we released last month, was intended to help educate and better-prepare today’s enterprises about the most sophisticated attack techniques hiding in today’s networks and evading preventative cybersecurity defenses. Over the past year, SS8 has conducted breach detection risk assessments on live production networks, using the SS8 BreachDetect [&he...

  • Breach Happens Podcast #2 – Dear Netflow…

    It’s not you, it’s me. Well, it is you NetFlow. We’ve had some good times, but I don’t feel like you’re meeting my needs anymore. So I think it’s time we broke up. In Episode Two of the BreachHappens podcast, NetFlow tries hard to get a security analyst back, but she’s moved on and lets [&hellip The post Breach Happens Podcast #2 – Dear Netflow… appeared first on Breacher Report.

  • Top Cyber Security Evasion and Exfiltration Techniques Exposed

    Over the past year, SS8 has conducted breach detection risk assessments on live production networks, using the SS8 BreachDetect platform, for companies in key industries including critical infrastructure, retail, and education. We’ve analyzed a whopping five billion high-definition records (HDRs) from a variety of environments, and from that, have now published what we refer to as [&hellip The pos...

  • Forrester Spotlights Security Analytics Vendor Landscape

    Forrester recently published its Vendor Landscape: Security Analytics (SA)[1] report, and there’s one theme we believe resonates more than any: Network visibility and insight is key to responding quickly to breaches that have slipped past your preventative measures. (If you’re a Forrester client, you can download the full report here.) According to the report, authored [&hellip The post Forrester ...

  • Not So SIEMple: 3 Things to Keep in Mind Before Falling into SIEM Reliance

    While many enterprise organizations are now relying on log data to answer the what, when, how, and why of a breach, the reality is that despite your team’s best efforts, more advanced threats will still slip past traditional preventative security tools and can hide on the network for an average of 200 days. This makes [&hellip The post Not So SIEMple: 3 Things to Keep in Mind Before Falling into S...

  • Breach Hunting: Simplified

    It’s no secret that the network is the key to finding breaches. 99% of breaches still occur over the network despite our best efforts to prevent them. When a breach slips onto the network, the best way to catch it quickly is with total network visibility. SS8 BreachDetect employs this concept to give you a [&hellip The post Breach Hunting: Simplified appeared first on Breacher Report.

  • Doubling-Down on Breach Detection at RSA 2017

    It’s that time of year again, the time when the cybersecurity industry convenes in San Francisco for the annual RSA Conference. What’s not to love if you’re a security pro: lots of top tech in one place, surrounded by peers you can learn from, security leaders sharing ideas, and of course, the parties. It shouldn’t [&hellip The post Doubling-Down on Breach Detection at RSA 2017 appeared first on B...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 6 months ago

New blog articles detected

  • HDRs optimize Rule-Based and Machine Learning Classification of Network Breaches

    SS8 has developed High-Definition Records (HDRs) as an answer to the lack of total network visibility that most enterprises face today. These HDRs provide more detailed information than NetFlow records by adding Application Level Metadata, such as the “To:” or “From:” field in an email to the record, and even include User Identity information. High-Definition [&hellip The post HDRs optimize Rule-B...

SS8, Inc.

Category: Content
Type: Blog Article

Generated 7 months ago

New blog articles detected

  • Advising the Commission on Enhancing National Cybersecurity: Isn’t it all about the Network?

    The Commission on Enhancing National Cybersecurity (Executive Order 13718) has requested information about current and future states of cybersecurity in the digital economy. The Commission solicited input through a public Request for Information, and SS8 has recently provided our comments. This is a notable effort, and we thank the Commission for taking our comments. In [&hellip The post Advising ...

  • Time for a Defensive Change in Cyber

    Today’s post was written by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T, Present CEO, TAG Cyber One of the conundrums facing the modern enterprise security team involves what to do about the ineffectiveness of the perimeter. Everyone agrees that unauthorized entry through open ports or advertised services in a leaky firewall has [&hellip The post Time for a Defensive Change in Cyber appeared...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in