Whether security testing is driven by compliance or as part of standard security resiliency testing, it is a vital component of an organization's defenses, especially in today's era of high-profile breaches.
Download this whitepaper to learn more about:
The role of deception in security testing
Examples of Red Team...
The use of deception technology to combat cyber attackers has steadily gained ground over
the last several years, especially among a subset of IT security practitioners who have grown
weary of the noise detection technologies generate. Those technologies yield an exponentially
larger number of false positives than...
Digitization across sectors has led to data proliferation, and organizations are struggling to handle the sheer volume of data. The abundance of valuable information has captured the attention of subversive elements, while cybercriminals have breached networks and compromised billions of records, not only causing...
Better network uptime?
Increased network speeds and data volumes require solutions that optimize performance and security. With inline bypass you select which mode tools operate in, so you can make intelligent decisions. A critical component of next-generation network packet brokers, inline bypass means just that:...
"Cyberattacks are one of the unfortunate realities of doing business today," reads gaming company Zynga's data breach notification, thus breaking the first rule of crisis management: Own your mistakes. Hacker Gnosticplayers claims the company was still storing passwords using outdated SHA1.
This session provides an introduction to deception detection, and body language in the world we live in. The presentation begins with a look at micro-expressions and then moves onto verbal and para-verbal indicators of deception, as well and non-verbal indicators of deception. Practical exercises and examples are...
Deception technology has emerged as a hot practice - but not one that is necessarily on every enterprise's budgeting radar. Don Gray, CTO of PacketViper, talks about the emergence of deception technology and how security leaders can make the case - and find the budget - for its usage.
The threat landscape grows more daunting and diverse each day. Security teams are scrambling to keep up with attacks targeting end users. These attacks are stealthier and harder to detect than ever before.
Download this white paper to learn more about:
Using AI to analyze threat scenarios;
Developing static...
Even with a growing variety of security tools at their disposal, detection and response is a challenge for all organizations. It took most US companies an average of 191 days to detect a breach in 2017 - so what's the delay in breach detection and response?
Download this white paper to learn more about:
The lack...
In just a few years' time, deception technology has matured to become a critical - and recommended - element of fundamental cybersecurity defense. Tony Cole, CTO of Attivo Networks, discusses critical success factors for deploying deception.
Deploying deception technology can give organizations a leg up when it comes to more quickly spotting and responding to data breaches, provided they configure and utilize the technology appropriately, says Rocco Grillo of the consultancy Alvarez & Marsal.
Deception technology, adversary intelligence and early detection can help counter spoofing and phishing attacks, says Sal Stolfo, the founder and CTO of Allure Security.
Finding a security framework comprehensive enough to serve the tactical needs of security operations teams can be difficult. MITRE ATT&CK is the first framework to meet these needs and provide a basis for real-time security operations improvements.
Download this white paper to learn more about:
The five essential...
This edition of the ISMG Security Report discusses the latest improvements in deception technology and how best to apply it. Also featured: a report on the growth of mobile fraud, plus insights on Merck's experience recovering from a NotPetya attack.
Deception technology is attractive in that it offers - in theory - low false positives and critical clues to attackers' methodologies. But the benefits depend on its ability to fool attackers and whether organizations can spare the time to fine-tune it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.