Author: Kevin Whalen

Post Exploit Visibility and the Need For Speed

Advanced malware is no longer the most dangerous enemy in the world of advanced threats. The new adversaries are human orchestrated attack campaigns — a series of hidden events engineered to create chaos. Improve your mean-time-to-detection and post-exploit visibility by looking within network traffic flowing […]

Read more

A Commitment to DDoS Managed Services

Arbor Cloud Logo

Arbor has played a foundational role in the creation of the DDoS managed services market. In the early 2000s, as DDoS attacks started targeting the enterprise, many businesses quickly realized they could not manage these new threats on their own using existing solutions. They needed […]

Read more

Network Security: Traffic is Truth

It’s not that the network is superior to an endpoint or other approaches; they all have their pros and cons. However, the network enables insight and inspires action. From the network, you can see all communications immediately, everywhere, you can look behaviorally and with signatures, […]

Read more