Resources
Revolutionizing ITDR with cyber deception
In the rapidly evolving world of cybersecurity, traditional Identity Threat Detection and Response (ITDR) systems are foundational in safeguarding organizational assets. Yet, these systems frequently display critical gaps, especially when faced with sophisticated,...
Why is deception technology necessary for cyber security?
A critical aspect that is often overlooked is the nature of asymmetric warfare between the attackers and the defense teams.
The Role of Deception Technology in the Endpoint Security Reference Architecture
According to the 2024 Gartner® "Reference Architecture Brief: Endpoint Security report “Endpoint security is the first line of defense for the largest attack surface within any organization. This brief provides guidance for security and risk management technical...
The Role of Deception Technology in The Network Security Reference Architecture
According to the 2024 Gartner® Reference Architecture Brief: Network Security report, “Network security underpins connectivity across the extended enterprise, encompassing public cloud, private cloud and on-premises. This brief provides guidance for security and risk...
Building an LLM-Powered Cybersecurity AI Assistant
The ever-shifting landscape of cyber threats demands constant adaptation and expertise from security professionals.
Navigating Through Accelerated Threats and the Imperative of Deception Technology
The CrowdStrike Global Threat Report for 2024 paints a bleak picture of a rapidly evolving cyber threat environment.
Acalvio ShadowPlex is the Industry-leading deception platform, once again!
GigaOm’s recently published Radar chart on cyber deception platforms for 2024 provides detailed comparison of leading deception vendors. The research involved a set of key business criteria for deception solutions and considers the requirements of different market segments.
HHS Recommends Including Deception Technology as a Critical Component of Cybersecurity Practices for Healthcare Organizations
One hundred and forty pages strong, the Health Industry Cybersecurity Practices (HICP) Technical Volume
The Identity Battlefield: Lessons from 2023’s Attacks and the Roadmap to Cybersecurity Resilience in 2024
In 2023, we witnessed a chilling parade of cyber-attacks where compromised enterprise identities served as the proverbial unlocked door!
Stopping identity-driven attacks from unmanaged endpoints
In cybersecurity, unmanaged endpoints represent a significant vulnerability within even the most meticulously planned defense strategies.
Cybersecurity Awareness Month: Cyber Deception in Focus
In the world of digital defenses and ever-changing threat landscapes, October holds a special significance – it is Cybersecurity Awareness Month!
Defending against identity impersonation attacks at MGM Resorts
MGM Resorts was compromised by a threat actor, Scattered Spider (UNC3944). The threat actor gained control over the super administrator account of Okta, gained Azure administrative rights, and gained Domain Admin privileges over the Active Directory.