DarkVishnya: Did You Invite a Bank Robber to Lunch?

By |2019-04-17T11:53:09+05:30April 10th, 2019|blog|

Robbing a bank is easy. You can do it in three easy steps: go inside the bank, find the money, leave with the money. And that’s exactly how DarkVishnya did it. Two major facets of security are physical and information. Most people think of physical security as walls, doors, or windows. Those things make up [...]

It Only Takes One Zombie

By |2019-04-17T11:53:17+05:30March 5th, 2019|blog|

Big Company — always safe on the inside. Everyone was worried about the zombie apocalypse, except for the Big Company employees. The walls of Big Company were tall and strong, keeping out the undead horde. Everyone was safe and sound until Frank had a heart attack in the break room. After that, the zombies were inside.   [...]

What To Do When a Lion Enters Your Network

By |2019-02-18T17:07:59+05:30January 29th, 2019|blog|

The zoo is a fantastic place to take the kids. In fact, it’s great for adults, too. The zoo has everything from the sweet and innocent ducks and geckos, to the not-so-sweet blood-thirsty polar bears and lions. Now imagine yourself walking through the zoo, maybe with a group of kids, when one of the [...]

Ridgeback Network Defense Inc.: Securing Networks with an Automatic Intrusion Expulsion System

By |2019-02-18T17:10:25+05:30January 17th, 2019|blog|

Thomas Phillips, CTO One of the biggest cybersecurity problems today is that an enormous amount of money is spent on attempts to secure and defend complex networks which, perversely, actually increase the burden on security professionals within the organization. In spite of taking layered security measures, any(in fact all)networks at some point get infiltrated [...]

The Ridgeback Backstory

By |2019-02-13T19:03:32+05:30October 27th, 2017|blog|

Thomas Phillips drew on his unique background to develop an original approach to cybersecurity - interactive defense. Ridgeback Network Defense’s co-founder and CTO has not only spent 30 years of developing software but also has extensive experience in both offensive and defensive hacking. He studied computer science and psychology in college and is a military [...]

Security experts vulnerable. Deloitte hacked.

By |2017-10-06T18:21:03+05:30September 26th, 2017|blog|

Deloitte is a multinational professional services firm that “provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.” In 2017, Gartner ranked Deloitte security consulting number one globally for the fifth year in a row. By all accounts, Deloitte is a well-respected company that definitely has their act together. [...]

Ridgeback participates at ISACA

By |2019-02-08T14:13:35+05:30August 1st, 2017|blog|

ISACA, US is an independent, non-profit, global association engaged in the development, adoption, and use of globally accepted, industry-leading knowledge and practices for information systems. With more than 600 active members, Pune Chapter of ISACA organized an annual conference on Transforming Security and Governance for Digital Age on July 7 and 8, 2017. Ridgeback was [...]

DDOS Explained

By |2017-05-30T18:32:36+05:30October 26th, 2016|blog|

Distributed denial of service (DDOS) attacks have been in the news lately, and a number of people have asked me whether Ridgeback can prevent such an attack. What seems like a simple question actually touches on some complex issues. This post breaks it all down. First, a DDOS attack consists of: An unregulated network connecting [...]

Where are the simulators?

By |2017-08-02T19:58:39+05:30June 10th, 2016|blog|

First, in case you missed it, Ridgeback Hunter version 1.3.0 has been posted in the early access forums. Now on to the topic of simulations... During the two Ridgeback Acid Test Events in 2015, Ridgeback had a number of basic simulators behind the responders. That is, you could connect to a decoy on a TCP [...]

Are you a good security professional?

By |2017-07-14T12:30:11+05:30May 4th, 2016|blog|

I recently read some posts from information security people who seemed to lack confidence in their abilities. Citing imposter syndrome, a feeling that they are not as competent as people think they are, they mused over whether their own skills and experience justified their roles as security professionals. This post is to spell out plainly [...]

Turtles versus Raptors: Are you hiding behind false walls?

By |2017-07-14T18:23:13+05:30October 17th, 2015|blog|

When it comes to security, there are two kinds of organizations -- turtles and raptors.  When an adversary attacks your organization, your posture as a turtle or a raptor matters quite a bit. A turtle organization has a hard, outer shell, but a soft, vulnerable interior.  The organization spends a lot on firewalls and intrusion [...]

Global interconnectivity beckons imminent disaster

By |2017-05-31T12:48:54+05:30August 2nd, 2015|blog|

I do not like fear mongering.  However, I do believe that technological advances are outpacing our collective understanding of their implications.  There is a dangerous difference between our understanding and what is actually happening.  We need to take action now. The threat I worry about is global interconnectivity.  As in, who the hell thinks it [...]

What is an Actor?

By |2017-05-31T12:58:19+05:30July 13th, 2015|blog|

The short answer: An actor is someone or something that is capable of sending information across your network. The long answer: The Ridgeback security appliance is really tracking agents in the sense of philosophy, sociology, linguistics, and artificial intelligence.  That is, an agent is an entity capable of "agency," or essentially capable of making something [...]

Your network is like a sponge

By |2017-07-14T18:26:55+05:30June 29th, 2015|blog|

Natural sponges are fascinating structures.  A sponge is irregularly shaped and has no clear entry or exit.  The very idea of a "perimeter" seems completely ill-matched to a sponge.  Once water gets into a sponge, the water can travel to any other part of the sponge through what seems to be a practically infinite number [...]