Ridgeback offers the best advice and insights, all in the name of helping you fight cyber attacks and protect your network.

What To Do When a Lion Enters Your Network

The zoo is a fantastic place to take the kids. In fact, it’s great for adults, too. The zoo has everything from the sweet and innocent ducks and geckos, to the not-so-sweet blood-thirsty polar bears and lions. Now imagine yourself walking through the zoo, maybe with a group of kids, when one of the [...]

By |2019-02-18T17:07:59+00:00January 29th, 2019|blog|0 Comments

Ridgeback Network Defense Inc.: Securing Networks with an Automatic Intrusion Expulsion System

Thomas Phillips, CTO One of the biggest cybersecurity problems today is that an enormous amount of money is spent on attempts to secure and defend complex networks which, perversely, actually increase the burden on security professionals within the organization. In spite of taking layered security measures, any(in fact all)networks at some point get infiltrated [...]

By |2019-02-18T17:10:25+00:00January 17th, 2019|blog|0 Comments

The Ridgeback Backstory

Thomas Phillips drew on his unique background to develop an original approach to cybersecurity - interactive defense. Ridgeback Network Defense’s co-founder and CTO has not only spent 30 years of developing software but also has extensive experience in both offensive and defensive hacking. He studied computer science and psychology in college and is a military [...]

By |2019-02-13T19:03:32+00:00October 27th, 2017|blog|0 Comments

Security experts vulnerable. Deloitte hacked.

Deloitte is a multinational professional services firm that “provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.” In 2017, Gartner ranked Deloitte security consulting number one globally for the fifth year in a row. By all accounts, Deloitte is a well-respected company that definitely has their act together. [...]

By |2017-10-06T18:21:03+00:00September 26th, 2017|blog|0 Comments

Ridgeback participates at ISACA

ISACA, US is an independent, non-profit, global association engaged in the development, adoption, and use of globally accepted, industry-leading knowledge and practices for information systems. With more than 600 active members, Pune Chapter of ISACA organized an annual conference on Transforming Security and Governance for Digital Age on July 7 and 8, 2017. Ridgeback was [...]

By |2019-02-08T14:13:35+00:00August 1st, 2017|blog|0 Comments

DDOS Explained

Distributed denial of service (DDOS) attacks have been in the news lately, and a number of people have asked me whether Ridgeback can prevent such an attack. What seems like a simple question actually touches on some complex issues. This post breaks it all down. First, a DDOS attack consists of: An unregulated network connecting [...]

By |2017-05-30T18:32:36+00:00October 26th, 2016|blog|0 Comments

Where are the simulators?

First, in case you missed it, Ridgeback Hunter version 1.3.0 has been posted in the early access forums. Now on to the topic of simulations... During the two Ridgeback Acid Test Events in 2015, Ridgeback had a number of basic simulators behind the responders. That is, you could connect to a decoy on a TCP [...]

By |2017-08-02T19:58:39+00:00June 10th, 2016|blog|0 Comments

Are you a good security professional?

I recently read some posts from information security people who seemed to lack confidence in their abilities. Citing imposter syndrome, a feeling that they are not as competent as people think they are, they mused over whether their own skills and experience justified their roles as security professionals. This post is to spell out plainly [...]

By |2017-07-14T12:30:11+00:00May 4th, 2016|blog|0 Comments

Global interconnectivity beckons imminent disaster

I do not like fear mongering.  However, I do believe that technological advances are outpacing our collective understanding of their implications.  There is a dangerous difference between our understanding and what is actually happening.  We need to take action now. The threat I worry about is global interconnectivity.  As in, who the hell thinks it [...]

By |2017-05-31T12:48:54+00:00August 2nd, 2015|blog|0 Comments

What is an Actor?

The short answer: An actor is someone or something that is capable of sending information across your network. The long answer: The Ridgeback security appliance is really tracking agents in the sense of philosophy, sociology, linguistics, and artificial intelligence.  That is, an agent is an entity capable of "agency," or essentially capable of making something [...]

By |2017-05-31T12:58:19+00:00July 13th, 2015|blog|0 Comments

Your network is like a sponge

Natural sponges are fascinating structures.  A sponge is irregularly shaped and has no clear entry or exit.  The very idea of a "perimeter" seems completely ill-matched to a sponge.  Once water gets into a sponge, the water can travel to any other part of the sponge through what seems to be a practically infinite number [...]

By |2017-07-14T18:26:55+00:00June 29th, 2015|blog|0 Comments