Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology and strategies for combatting targeted attacks

We Are Failing At Information Security! (part 1)

Recent reports point to a troubling reality – threat detection strategies aren’t identifying attackers early enough, and dwell times are stubbornly high.

In this 2-part guest post series from Kevin Fiscus, SANS instructor and cybersecurity expert, we’ll take a deep dive into how deception technology can help. Read More

Actionable Forensics for SOAR: An Illusive Networks Integration with Cortex XSOAR

Arguably, defenders have more data and intelligence than ever about impending threats and attacks. According to a recent Ponemon Institute study, the average organization deploys 47 separate security solutions, each providing a dizzying array of alerts and reporting. If an intruder gets in, it should be easy to identify and stop them, right? Surely an alert has gone off somewhere in the system. Of course, it's not so simple.
Read More

Deception Platforms Positioned in the Peak of Inflated Expectations on the Gartner Hype Cycle for Security Operations, 2020

We’re excited to share that Gartner’s latest Hype Cycle for Security Operations, 2020 – available here to Gartner subscribers – has positioned Deception Platforms in the Peak of Inflated Expectations on the Hype Cycle. According to the report, “security operations technologies and services defend IT systems from attack through the identification of threats and exposure to vulnerability, enabling effective response and remediation. The innovations included here aim to help security and risk management leaders enhance their strategy.”

Read More

The Rapid Rise of Insider Threats During COVID – and How You Can Stop It Now

What an amazing time to be a hacker – systems weakened, attention drawn elsewhere, targets operating under duress in unfamiliar environments. It’s infuriating that right now, while armies of medical professionals and first responders are risking their lives to save ours, armies of nation-state cyber attackers are working 24/7 shifts to silently plant seeds across the global enterprises that they will return to compromise as the crisis passes.
Read More