blog

/blog

Ridgeback offers the best advice and insights, all in the name of helping you fight cyber attacks and protect your network.

DarkVishnya: Did You Invite a Bank Robber to Lunch?

Robbing a bank is easy. You can do it in three easy steps: go inside the bank, find the money, leave with the money. And that’s exactly how DarkVishnya did it. Two major facets of security are physical and information. Most people think of physical security as walls, doors, or windows. Those things make up [...]

By |2019-04-17T11:53:09+05:30April 10th, 2019|blog|0 Comments

It Only Takes One Zombie

Big Company — always safe on the inside. Everyone was worried about the zombie apocalypse, except for the Big Company employees. The walls of Big Company were tall and strong, keeping out the undead horde. Everyone was safe and sound until Frank had a heart attack in the break room. After that, the zombies were inside.   [...]

By |2019-04-17T11:53:17+05:30March 5th, 2019|blog|0 Comments

What To Do When a Lion Enters Your Network

The zoo is a fantastic place to take the kids. In fact, it’s great for adults, too. The zoo has everything from the sweet and innocent ducks and geckos, to the not-so-sweet blood-thirsty polar bears and lions. Now imagine yourself walking through the zoo, maybe with a group of kids, when one of the [...]

By |2019-02-18T17:07:59+05:30January 29th, 2019|blog|0 Comments

Ridgeback Network Defense Inc.: Securing Networks with an Automatic Intrusion Expulsion System

Thomas Phillips, CTO One of the biggest cybersecurity problems today is that an enormous amount of money is spent on attempts to secure and defend complex networks which, perversely, actually increase the burden on security professionals within the organization. In spite of taking layered security measures, any(in fact all)networks at some point get infiltrated [...]

By |2019-02-18T17:10:25+05:30January 17th, 2019|blog|0 Comments

The Ridgeback Backstory

Thomas Phillips drew on his unique background to develop an original approach to cybersecurity - interactive defense. Ridgeback Network Defense’s co-founder and CTO has not only spent 30 years of developing software but also has extensive experience in both offensive and defensive hacking. He studied computer science and psychology in college and is a military [...]

By |2019-02-13T19:03:32+05:30October 27th, 2017|blog|0 Comments

Security experts vulnerable. Deloitte hacked.

Deloitte is a multinational professional services firm that “provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.” In 2017, Gartner ranked Deloitte security consulting number one globally for the fifth year in a row. By all accounts, Deloitte is a well-respected company that definitely has their act together. [...]

By |2017-10-06T18:21:03+05:30September 26th, 2017|blog|0 Comments

Ridgeback participates at ISACA

ISACA, US is an independent, non-profit, global association engaged in the development, adoption, and use of globally accepted, industry-leading knowledge and practices for information systems. With more than 600 active members, Pune Chapter of ISACA organized an annual conference on Transforming Security and Governance for Digital Age on July 7 and 8, 2017. Ridgeback was [...]

By |2019-02-08T14:13:35+05:30August 1st, 2017|blog|0 Comments

DDOS Explained

Distributed denial of service (DDOS) attacks have been in the news lately, and a number of people have asked me whether Ridgeback can prevent such an attack. What seems like a simple question actually touches on some complex issues. This post breaks it all down. First, a DDOS attack consists of: An unregulated network connecting [...]

By |2017-05-30T18:32:36+05:30October 26th, 2016|blog|0 Comments

Where are the simulators?

First, in case you missed it, Ridgeback Hunter version 1.3.0 has been posted in the early access forums. Now on to the topic of simulations... During the two Ridgeback Acid Test Events in 2015, Ridgeback had a number of basic simulators behind the responders. That is, you could connect to a decoy on a TCP [...]

By |2017-08-02T19:58:39+05:30June 10th, 2016|blog|0 Comments

Are you a good security professional?

I recently read some posts from information security people who seemed to lack confidence in their abilities. Citing imposter syndrome, a feeling that they are not as competent as people think they are, they mused over whether their own skills and experience justified their roles as security professionals. This post is to spell out plainly [...]

By |2017-07-14T12:30:11+05:30May 4th, 2016|blog|0 Comments

Global interconnectivity beckons imminent disaster

I do not like fear mongering.  However, I do believe that technological advances are outpacing our collective understanding of their implications.  There is a dangerous difference between our understanding and what is actually happening.  We need to take action now. The threat I worry about is global interconnectivity.  As in, who the hell thinks it [...]

By |2017-05-31T12:48:54+05:30August 2nd, 2015|blog|0 Comments

What is an Actor?

The short answer: An actor is someone or something that is capable of sending information across your network. The long answer: The Ridgeback security appliance is really tracking agents in the sense of philosophy, sociology, linguistics, and artificial intelligence.  That is, an agent is an entity capable of "agency," or essentially capable of making something [...]

By |2017-05-31T12:58:19+05:30July 13th, 2015|blog|0 Comments

Your network is like a sponge

Natural sponges are fascinating structures.  A sponge is irregularly shaped and has no clear entry or exit.  The very idea of a "perimeter" seems completely ill-matched to a sponge.  Once water gets into a sponge, the water can travel to any other part of the sponge through what seems to be a practically infinite number [...]

By |2017-07-14T18:26:55+05:30June 29th, 2015|blog|0 Comments