Who can use cyber deception? We get this question all the time. Deception technology is gaining recognition as one of the most fail-proof ways to protect against cyber attackers, and one of the only ways to detect insider threats and lateral movement.
Operational technology is a security challenge for industrial organizations around the world. The repercussions of an OT hack can pose dangers for society as a whole, as we saw recently in the Florida water hack.
The impact of the SolarWinds Orion attack is staggering. The newly discovered Hafnium/Microsoft breach looks to be potentially just as wide reaching. However, these are only the latest attacks in which US companies and agencies will be struggling for years with how compromised they are.
Insider threats were involved in 30% of the data breaches in 2020. Insider threats are one of the most difficult security problems to detect, but CounterCraft provides high-confidence alerts by creating deception environments that attract anyone poking around where they shouldn’t be.
What do you do when sophisticated attackers disguise themselves as low-priority threat actors to more easily deliver a dangerous payload? I want to take security leaders back to a news story that broke in the preceding months and got overshadowed by the huge Solar Winds news.