Deception: The Fast Track to Zero Trust Security

Deception: The Fast Track to Zero Trust Security

The Zero Trust security model is conceptually simple, but fiendishly difficult to implement at scale.  Zero Trust (ZT) simply means that we cannot trust the perimeter to keep the bad guys out, and therefore all internal network traffic must be considered malicious...
Using Deep Learning for Information Security – Part 2

Using Deep Learning for Information Security – Part 2

Authors: Santosh Kosgi, Mohammad Waseem, Arunabha Choudhury, and Satnam Singh Deep Learning-based methods have been successfully applied to various computer vision and NLP based problems recently [1]. AI researchers have achieved statistically significant improvements...
Formjacking: Deception is your cure

Formjacking: Deception is your cure

I recently saw a news article published by Symantec stating that cyber criminals are shifting their attack techniques. According to Symantec, “For the first time since 2013, ransomware infections declined, dropping by 20 percent.” Due to the sharp decline in the price...
DECEPTION: YOU KEEP USING THAT WORD…

DECEPTION: YOU KEEP USING THAT WORD…

I DO NOT THINK IT MEANS WHAT YOU THINK IT MEANS If you recognize the quote in the title of this blog entry, then you also know one of my favorite movies of all time is Princess Bride. If you didn’t recognize it, here’s a relevant reminder:...
Using Deception to effectively fight Ransomware

Using Deception to effectively fight Ransomware

Ransomware infections have fallen 30% over the past 12 months according to a research conducted by Kaspersky (Ransomware and Malicious Cryptominers 2016-2018 report), The decline correlates with the crashing price of popular cryptocurrencies,   This, however, does not...
Advancing State of Art in Cloud Malware Detection

Advancing State of Art in Cloud Malware Detection

In the past few blogs (All Roads Lead to Kubernetes, and Deceiving Attackers in a Kubernetes World) we zeroed in on the cloud native environments being the next frontier for the attacker-defender games. We also commented on how deploying deception in a...