Ridgeback offers the best advice and insights, all in the name of helping you fight cyber attacks and protect your network.


So why would we (and why you should)  give Active Directory (AD) all this attention and importance? Active Directory makes life easier for system administrators by providing many core features, such as centralizing resources and security administration, single sign-on for access to global resources, simplified resource location, and more.  All these pros look excellent and [...]

By |2021-02-11T11:21:06+05:30February 10th, 2021|blog|0 Comments


The 007 film series was and still is one of the most iconic movie series of all time.  As the author of this piece, my favorite one is “Skyfall”. It premiered in 2012, and I can tell that I’ve watched it, like, one hundred times and I will come back to it in the future.  [...]

By |2020-12-15T12:30:19+05:30December 14th, 2020|blog|0 Comments


No one can deny the primacy of automation in today’s world. In recent decades, humans have accelerated the pace of innovation, deploying new technologies wherever it’s possible.  Even humans themselves cannot suppress this evolution because technology has helped them automate various aspects of life. And while I was looking for an example to put here, [...]

By |2020-11-27T15:31:26+05:30November 26th, 2020|blog|0 Comments


Are you a fan of ninjas? We are talking about those shinobi fighters we usually see on TV shows and kids’ cartoons with a mask, black outfit, unseeable boots, a fancy and destructive-looking katana, and other cool ancient weapons.  Ninjas lived in Japan a long time ago in the era of feudal Japan.  They were [...]

By |2020-11-12T16:40:23+05:30November 12th, 2020|blog|0 Comments

The Fake Detective In Your Network

So what do detectives do? Yeah! Because there is a correlation of characteristics between a cybercriminal and a detective. We will talk about some, but we will focus on one that connects them all. (Spoiler, it’s reconnaissance.) Whenever an illegal offense happens, you would find a detective, curious, probably with a ballpoint pen and a [...]

By |2020-11-12T16:41:01+05:30October 20th, 2020|blog|0 Comments

Secure your Network by Disrupting and Preventing Lateral Movement

All about lateral movement in cybersecurity breaches,and how to protect against it “There are only two types of companies: those that have been hacked and those that don’t know they have been hacked.”Robert S. Mueller III, former director of the FBI. Cybersecurity breaches occur routinely in businesses, no matter the industry. And because attackers [...]

By |2019-11-08T12:51:09+05:30November 7th, 2019|blog|0 Comments

The Trouble with Tribbles

What is furry, affectionate, and purrs? A tribble! Tribbles were the tragic stars in an old Star Trek episode, “The Trouble with Tribbles.” Tribbles made awesome pets. However, things went bad when people discovered how quickly tribbles reproduce. If you look around, you might find something like tribbles in your network. Containers can make life [...]

By |2019-04-27T10:58:19+05:30April 26th, 2019|blog|0 Comments

DarkVishnya: Did You Invite a Bank Robber to Lunch?

Robbing a bank is easy. You can do it in three easy steps: go inside the bank, find the money, leave with the money. And that’s exactly how DarkVishnya did it. Two major facets of security are physical and information. Most people think of physical security as walls, doors, or windows. Those things make up [...]

By |2019-04-17T11:53:09+05:30April 10th, 2019|blog|0 Comments

It Only Takes One Zombie

Big Company — always safe on the inside. Everyone was worried about the zombie apocalypse, except for the Big Company employees. The walls of Big Company were tall and strong, keeping out the undead horde. Everyone was safe and sound until Frank had a heart attack in the break room. After that, the zombies were inside.   [...]

By |2019-04-17T11:53:17+05:30March 5th, 2019|blog|0 Comments

What To Do When a Lion Enters Your Network

The zoo is a fantastic place to take the kids. In fact, it’s great for adults, too. The zoo has everything from the sweet and innocent ducks and geckos, to the not-so-sweet blood-thirsty polar bears and lions. Now imagine yourself walking through the zoo, maybe with a group of kids, when one of the [...]

By |2019-02-18T17:07:59+05:30January 29th, 2019|blog|0 Comments

Ridgeback Network Defense Inc.: Securing Networks with an Automatic Intrusion Expulsion System

Thomas Phillips, CTO One of the biggest cybersecurity problems today is that an enormous amount of money is spent on attempts to secure and defend complex networks which, perversely, actually increase the burden on security professionals within the organization. In spite of taking layered security measures, any(in fact all)networks at some point get infiltrated [...]

By |2019-02-18T17:10:25+05:30January 17th, 2019|blog|0 Comments

Hacked? When in Doubt, Nuke it. It will Make you Feel Good.

Many people ask questions like “How do I know if I have been hacked?” or “What do I do if I have been hacked?” There is an easy answer to these questions — Nuke everything and start over. Then you can be fairly certain everything is okay. (For a while, at least!) This may sound a little [...]

By |2020-07-17T14:43:26+05:30January 14th, 2019|blog|Comments Off on Hacked? When in Doubt, Nuke it. It will Make you Feel Good.

The Ridgeback Backstory

Thomas Phillips drew on his unique background to develop an original approach to cybersecurity - interactive defense. Ridgeback Network Defense’s co-founder and CTO has not only spent 30 years of developing software but also has extensive experience in both offensive and defensive hacking. He studied computer science and psychology in college and is a military [...]

By |2019-02-13T19:03:32+05:30October 27th, 2017|blog|0 Comments

Security experts vulnerable. Deloitte hacked.

Deloitte is a multinational professional services firm that “provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.” In 2017, Gartner ranked Deloitte security consulting number one globally for the fifth year in a row. By all accounts, Deloitte is a well-respected company that definitely has their act together. [...]

By |2017-10-06T18:21:03+05:30September 26th, 2017|blog|0 Comments

Ridgeback participates at ISACA

ISACA, US is an independent, non-profit, global association engaged in the development, adoption, and use of globally accepted, industry-leading knowledge and practices for information systems. With more than 600 active members, Pune Chapter of ISACA organized an annual conference on Transforming Security and Governance for Digital Age on July 7 and 8, 2017. Ridgeback was [...]

By |2019-02-08T14:13:35+05:30August 1st, 2017|blog|0 Comments

DDOS Explained

Distributed denial of service (DDOS) attacks have been in the news lately, and a number of people have asked me whether Ridgeback can prevent such an attack. What seems like a simple question actually touches on some complex issues. This post breaks it all down. First, a DDOS attack consists of: An unregulated network connecting [...]

By |2017-05-30T18:32:36+05:30October 26th, 2016|blog|0 Comments

Where are the simulators?

First, in case you missed it, Ridgeback Hunter version 1.3.0 has been posted in the early access forums. Now on to the topic of simulations... During the two Ridgeback Acid Test Events in 2015, Ridgeback had a number of basic simulators behind the responders. That is, you could connect to a decoy on a TCP [...]

By |2017-08-02T19:58:39+05:30June 10th, 2016|blog|0 Comments

Are you a good security professional?

I recently read some posts from information security people who seemed to lack confidence in their abilities. Citing imposter syndrome, a feeling that they are not as competent as people think they are, they mused over whether their own skills and experience justified their roles as security professionals. This post is to spell out plainly [...]

By |2017-07-14T12:30:11+05:30May 4th, 2016|blog|0 Comments

Global interconnectivity beckons imminent disaster

I do not like fear mongering.  However, I do believe that technological advances are outpacing our collective understanding of their implications.  There is a dangerous difference between our understanding and what is actually happening.  We need to take action now. The threat I worry about is global interconnectivity.  As in, who the hell thinks it [...]

By |2017-05-31T12:48:54+05:30August 2nd, 2015|blog|0 Comments

What is an Actor?

The short answer: An actor is someone or something that is capable of sending information across your network. The long answer: The Ridgeback security appliance is really tracking agents in the sense of philosophy, sociology, linguistics, and artificial intelligence.  That is, an agent is an entity capable of "agency," or essentially capable of making something [...]

By |2017-05-31T12:58:19+05:30July 13th, 2015|blog|0 Comments

Your network is like a sponge

Natural sponges are fascinating structures.  A sponge is irregularly shaped and has no clear entry or exit.  The very idea of a "perimeter" seems completely ill-matched to a sponge.  Once water gets into a sponge, the water can travel to any other part of the sponge through what seems to be a practically infinite number [...]

By |2017-07-14T18:26:55+05:30June 29th, 2015|blog|0 Comments
Go to Top