Using deception technologies can impose a cost on cybercriminals and help reduce dwell times and increase visibility, says Acalvio CEO Ram Varadarajan.
Bots touch virtually every part of our digital lives; they populate our news feed, tell the weather, provide stock market updates, and control search rankings. We use bots to book travel, access online customer support - even turn on the lights in our own homes.
It's no wonder that bots also now account for over half...
Deception technology has come of age in the marketplace, but there is still some customer confusion about the distinct use cases. Ofer Israeli, CEO of Illusive Networks, shares how mature companies deploy deception.
According to the VMware Carbon Black Threat Analysis Unit (TAU), retail organizations may see a noticeable spike in attempted cyberattacks during the holiday season. ""This guide is an introduction to the world of cybersecurity-it's history, language and resources-so you can further educate yourself on this rapidly...
Trend Micro researchers created a phony "smart factory" that lured attackers, demonstrating how they are increasingly focusing on industrial control systems and have become adept at planting malware within vulnerable infrastructure.
Deception technologies offer a way to shift away from a purely defensive "detect and response" posture toward a more proactive offensive approach that draws stealth cyberattackers into the open before a breach.
Deception technology is evolving as a powerful asset in the cybersecurity arsenal, providing significant advantages in being able to monitor an attacker's behavior, says Joseph Krull, senior analyst at Aite Group.
The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.
Increased compute power, artificial intelligence, and tools on the Dark Web are equipping cyberattackers with the resources to launch more sophisticated and destructive attacks. Reactive defenses are no longer enough to stop attackers from infiltrating even the best security architectures. Environmental dynamics are...
As cyberattacks increase in sophistication and penetrate networks with higher frequency and effectiveness, security professionals are expressing growing concerns about being able to quickly detect and stop in-network threats from both internal and external threat actors.
The growing number of these cyberattacks have...
By design, Active Directory (AD) will readily exchange information with any member system
it manages. Attackers can also leverage this access to extract information on the entire domain quickly. Security teams may not realize that attacks on AD are occurring because the activities will appear as if AD is providing...
Insider threats are one of the most difficult challenges an organization can face. Where a range of conventional defenses exist to thwart exterior threats, malicious actors within an organization are much more difficult to identify and contain. This paper will delve into the challenges presented by insider threats and...
Whether security testing is driven by compliance or as part of standard security resiliency testing, it is a vital component of an organization's defenses, especially in today's era of high-profile breaches.
Download this whitepaper to learn more about:
The role of deception in security testing
Examples of Red Team...
The use of deception technology to combat cyber attackers has steadily gained ground over
the last several years, especially among a subset of IT security practitioners who have grown
weary of the noise detection technologies generate. Those technologies yield an exponentially
larger number of false positives than...
Election hacking is not just a US issue; it's a hot topic for every global democracy. And Joseph Carson of Thycotic is concerned that too many people are focused on the wrong elements of this topic. He analyzes the specific hacking techniques that demand attention.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.