Category: Industry
6 takeaways from GOV.UK’s 2021 cybersecurity breaches survey
COVID-19 has impacted security measures like monitoring, fewer organizations are detecting threats, phishing is the most common threat, and more. Includes active defense recommendations.By Amir MoinUsing deception to shield the insurance sector
Insurance companies are under siege from cyberattacks. We take a look at some of the key pieces of an insurer’s infrastructure the adversaries target and how you can use deception to build active defenses.By Sudarshan PisupatiYou Need Deception Technology. And It’s Not Why You Think
Deception technology is a different way of thinking about cybersecurity. Without it, attackers have the advantage. You can take that advantage back.By Kevin Fiscus7 Ways to Fail At Implementing Deception Technology
Since there’s precious little information on how security teams can make deception implementations successful (some folks like to keep it a secret), there’s plenty that can go wrong. Here are 7 ways to completely botch your deployment of deception technology.By Smokescreen Team10 Questions To Ask Deception Technology Vendors
Deception technology is a major buzzword today. In order for you to cut through the marketing hype, here’s a set of evaluation questions that will help you better understand disparate deception offerings and identify vendors that know what they’re doing.By Smokescreen TeamIn Defence of Signatures – They Don’t Suck
Signatures take a beating in most conversations in security. What, if anything, are they actually good for, then? Team Smokescreen stands up for the rights of the humble signature, explaining why they’re misapplied and how to better use them for defenceBy Smokescreen TeamImproving Cybersecurity With Adversarial Thinking
People often ask me about ‘adversarial thinking’ — that somewhat amorphous concept that defines security folk with the uncanny ability to mentally model how things can break. Here’s how you approach it.By Smokescreen TeamDeception and Kerckhoffs’s Cryptographic Principle
The parallels between deception in the real-world, and deception in cyberspace are clear and easy to understand. However, deception in the digital battlefield is far more nuanced — it’s easy to do it badly, and far harder to get it right. Which makes it rather similar to a more traditional security practice — cryptography.By Smokescreen TeamThe Capability Maturity of 3rd Generation Deception Technology
Deception in cybersecurity has come a long way from the early days of honeypots. Recent advances in virtualisation and evolving modern attacks have led to a rapidly maturing set of capabilities that organisations must adopt to see value from deception systems.By Smokescreen Team