The Centripetal Blog

Centripetal’s QuickThreat App for Splunk:  Powerful Visibility

March 4, 2018 | Robert Anderson
Centripetal hit another major product milestone and successfully released a QuickThreat® dashboard built natively for Splunk. The release of QuickThreat for Splunk, an industry standard SIEM platform, enables any Centripetal user to integrate their intelligence workflow directly in their S...
Read More

CleanINTERNET: A Security Service Engagement That Delivers Rapid Time-to-Value

February 14, 2018 | Robert Anderson
We all want CleanINTERNET. A connection to and from the outside world that is free of all known viruses, phishing schemes, malicious attacks, cyber exploits and the like. A clean connection that keeps the bad actors away from our sensitive data and important applications, so that an organi...
Read More

Centripetal + ThreatSTOP: Weaponizing Threat Intelligence for the Most Dangerous Threats

December 14, 2017 | Centripetal Networks Inc.
Centripetal has long taken a stance that its not good enough just to HAVE threat intelligence – you need to be able to actually do something with it. And by actually doing something with it, we leverage key partners we work with to deliver different types of intelligence to customers that ...
Read More

Threat Intelligence Gateways: The Emergence of Truly Advanced Prevention

December 7, 2017 | Centripetal Networks Inc.
If you don’t know what a Threat Intelligence Gateway (TIG) is, and you are in the cybersecurity industry, you should. It’s a new class of solutions solving a substantial delta between actually leveraging threat intelligence for a real-time defense, and network security. New and emerging. N...
Read More

Baiting the Phisherman

May 20, 2016 | Steven Rogers
A Centripetal Network sales person recently received an email that appeared to be from me, CEO Steven Rogers, requesting an immediate wire transfer in the amount of $32,780. Upon closer examination, the email originated from a similar domain, with one spelling change, centripAtalnetworks.c...
Read More

Zero Days and Cyber Threat Intelligence

April 11, 2016 | Jess Parnell
While there is no silver bullet for zero day detection, threat intelligence can help in reducing the opportunities for exposure. The RuleGate® appliance using Cyber Threat Intelligence can detect/block the exploit from reaching the client, as well as detect/block its command and control co...
Read More

Ransomware on the Rise

March 31, 2016 | Suzanne McGhee
The use of ransomware is a disturbing trend on the rise among cyber hackers. Ransomware is sent to a company, or to an individual user, through an email phishing method. This email method has recently been successful in tricking unsuspecting individuals to open emails that appear trustwort...
Read More