Chris Kubic, former CISO of the National Security Agency, describes how deception technology can change the defensive landscape: "Where deception comes into play is for the unknown threats, the things that are either an attack you haven't seen before or the attacker evolved their technique."
The latest edition of the ISMG Security Report offers leadership lessons from Equifax CISO Jamil Farshchi and Mastercard's deputy CSO, Alissa "Dr. Jay" Abdullah. Also featured: An assessment of cybersecurity priorities for President-elect Joe Biden.
MITRE has launched a knowledge base named Shield that captures capabilities surrounding Active Defense and adversary engagements. The very first publication of this knowledge base is in the form of a matrix listing capabilities for Active Defense. From a defender's perspective, the ATT&CK matrix provides a data model...
President-elect Joe Biden's approach to cybersecurity will likely mirror that of his old boss, former President Barack Obama. Expect Biden's White House to increase pressure on Russia, practice greater involvement in cybersecurity and return to higher levels of coordination than President Trump demanded.
Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
Ransomware, wire transfer fraud, destructive attacks: In recent months, the financial sector has seen these and other online attacks surge by 238% as criminals continue to exploit the pandemic, warns Tom Kellermann of VMware Carbon Black, who shares findings from his firm's third "Modern Bank Heists" report.
How have attack trends altered the
risk landscape, and what role will
deception technology play when
enterprises emerge from crisis
Download this eBook to learn more about:
How organizations are planning cybersecurity in 2021;
The latest attack trends and risks;
How deception technology helps...
Download this case study on ATMs being infected with malware and learn why:
The bank's firewall couldn't detect any malicious activity because the malware exploited a legitimate communication channel;
As the malware propagated from the ATMs to the network, it inadvertently attempted to infect decoys thanks to a...
When an NYSE-listed global business process management company had one of their critical identity and access management servers exposed to the Internet and made remotely accessible, how did they prevent it from becoming a DEFCON-1?
Download this case study and learn how they used decoy accounts to catch the...
Most organizations struggle with striking a balance between security priorities and the objectives of critical business functions. This tension is especially pronounced in businesses that manage large-scale industrial control systems where availability takes precedence over security.
Download this case study and...
Security teams are facing a worst-case scenario - juggling identity and access management while detecting threats for an infrastructure that is no longer within the safe confines of their castle walls.
The fastest to react to this tectonic shift have been the hackers. How are they planning their attacks? What can...
As global enterprises get their arms around supporting and securing a near-total remote workforce, their digital adversaries are adapting - and so is the role of deception technology. Carolyn Crandall of Attivo Networks discusses how deception can help mitigate new risks.
The UK Public Sector DNS Service is one of the NCSC's most widely deployed Active Cyber Defence capabilities across the public sector to date. The NCSC has partnered with Government Digital Services (GDS) and Nominet to provide the Protective DNS service.
Download this infographic for a statistical summary from...