Blog
Deception Technology in Healthcare – When Good Medical Devices Go Bad
Healthcare institutions continue to be heavily targeted by cyber attackers. A review of the current data in the Department of Health and Human Services, Office for Civil Rights (HHS OCR), database of major breaches shows that cyber attackers continue to compromise our...
Want to Get Serious about APTs? NIST Knows a Thing or Two, Because They’ve Seen a Thing or Two
If there's any organization that knows about dealing with advanced persistent threats (APTs) it's NIST. The US government is constantly targeted by the most sophisticated adversaries, and the attacks are directed at both the government agencies themselves, and...
“Amazon Firestick” is to “VCR”, as “Deception” is to _________
Complete the Analogy: “Amazon Firestick” is to “VCR”, as “Deception” is to _________. Correct Answer: “Honeypot” Remember your SAT or ACT exams with the analogy questions? If so you probably got this one right. For those of us old enough to remember, Video Cassette...
The Deceptively Simple Shortcut to Visibility
If you’ve ever had a security vendor pitch their wiz-bang internal network threat prevention solution, you’ve probably thought at some point “You’re getting ahead of yourself. First we need to know what’s going on, then we can talk about active controls on the...
Deception: The Fast Track to Zero Trust Security
Zero Trust is a great idea that’s hard to argue with
Using Deep Learning for Information Security – Part 2
Authors: Santosh Kosgi, Mohammad Waseem, Arunabha Choudhury, and Satnam Singh Deep Learning-based methods have been successfully applied to various computer vision and NLP based problems recently [1]. AI researchers have achieved statistically significant improvements...
Formjacking: Deception is your cure
Formjacking attacks embed JavaScript into ecommerce sites to siphon off credit card data.
DECEPTION: YOU KEEP USING THAT WORD…
Cyber deception. Do you know what it means?
Using Deception to effectively fight Ransomware
Deception could be a game changer in terms of detecting Ransomware.