Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

Analysis of an Emotet infection via a malicious Excel macro

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

1 Jun

Attack Trees in Deception Campaigns

READ MORE

The concept of attack trees or attack paths and how to increase the cost for the attacker in time and resources (not always monetary) has been discussed many times and it is still considered a good approach in any modern security strategy.

27 May

How to Effectively Use MITRE ATT&CK and Deception Campaigns to Engage with Threat Actors

READ MORE

The growing popularity of MITRE ATT&CK is a good indication that finally, we have a common language to describe the tools, techniques and procedures (TTPs) that threat actors are using in their daily operations.

18 May

Data Protection for the Healthcare Sector and Laboratories

READ MORE

In a post COVID-19 world the security landscape of many organisations has been radically realigned. In particular, the healthcare sector was facing significant challenges prior to the pandemic, so the current situation has only added to the security burdens they face.

7 May

Remote Access & VPN Risks in the New Cybersecurity Scenario

READ MORE

With most employees working from home amid today’s COVID-19 outbreak, VPN and remote access to enterprise resources have drastically increased. This is a huge challenge for the IT and security departments as many security experts believe that the current VPN deployments are designed for a small percentage of employees of the organizations and not for the overwhelming number of teleworkers who now need to access them repeatedly throughout the workday.

28 Apr

How to Use Cyber Deception Technology to Block Targeted Phishing Campaigns

READ MORE

In these uncertain times, CISOs are having to deal with an entirely new security profile for their organisations. The ability to control every security facet on end users’ machines has been loosened considerably.

Page 43 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE