Author: Kevin Whalen

Post Exploit Visibility and the Need For Speed

Advanced malware is no longer the most dangerous enemy in the world of advanced threats. The new adversaries are human orchestrated attack campaigns — a series of hidden events engineered to create chaos. Improve your mean-time-to-detection and post-exploit visibility by looking within network traffic flowing […]

Read more

A Commitment to DDoS Managed Services

Arbor Cloud Logo

Arbor has played a foundational role in the creation of the DDoS managed services market. In the early 2000s, as DDoS attacks started targeting the enterprise, many businesses quickly realized they could not manage these new threats on their own using existing solutions. They needed […]

Read more

Network Security: Traffic is Truth

It’s not that the network is superior to an endpoint or other approaches; they all have their pros and cons. However, the network enables insight and inspires action. From the network, you can see all communications immediately, everywhere, you can look behaviorally and with signatures, […]

Read more

Lessons from the NFL Draft

NFL Draft Image

Even though the Patriots barely participated, making only four picks total, fewest in franchise history, I still watched an embarrassingly large amount of the NFL draft over the weekend.  It can be highly entertaining. Take Dallas Cowboy legend Drew Pearson’s epic trolling of the Philadelphia […]

Read more