strategy

If you're a target for either financially motivated cyber-criminals, or nation state grade attackers, chances are your security team feels outgunned -- the bad guys have the time, the skills, and the resources to affect a data-breach, and they only have to succeed once, while your security team has to get it right every time. What if you could turn the tables on them? Deception technology excels at detecting these attacks by shifting the cognitive, economic...

Deception technology is a major buzzword today. In order for you to cut through the marketing hype, here's a set of evaluation questions that will help you better understand disparate deception offerings....

The parallels between deception in the real-world, and deception in cyberspace are clear and easy to understand. However, deception in the digital battlefield is far more nuanced -- it's easy to do it badly, and far harder to get it right. Which makes it rather similar to a more traditional security practice -- cryptography....

Deception has a centuries-old successful history in military warfare. Military doctrine from Sun Tzu, Genghis Khan, Clausewitz, Machiavelli and Chanakya, all the way through the Second World War has stressed the importance of deceiving the enemy to know their plans and thwart their objectives....

Leading Chief Security Officers are changing their approach to cyber-security, moving towards pro-active detection and automated response. Here's the results of our survey of how they're changing the game....

Malware detection is a whack-a-mole game. Like the mythical hydra, when you chop off one head, three more appear, But that's just half the issue....