Deception: The Fast Track to Zero Trust Security

Deception: The Fast Track to Zero Trust Security

The Zero Trust security model is conceptually simple, but fiendishly difficult to implement at scale.  Zero Trust (ZT) simply means that we cannot trust the perimeter to keep the bad guys out, and therefore all internal network traffic must be considered malicious...
Advancing State of Art in Cloud Malware Detection

Advancing State of Art in Cloud Malware Detection

In the past few blogs (All Roads Lead to Kubernetes, and Deceiving Attackers in a Kubernetes World) we zeroed in on the cloud native environments being the next frontier for the attacker-defender games. We also commented on how deploying deception in a...
Deceiving Attackers in a Kubernetes World

Deceiving Attackers in a Kubernetes World

Applications are moving to cloud-native Kubernetes-based platforms, come hell or high water, lift-and-shift as stateful apps or rewrite into a microservice design. Now what? The malware and threads follow the applications to these cloud native platforms. As the Tesla...