Support Login.

five × 3 =

 

Blogs

Lights, Cameras, Hack(tion)

15:39 15 March in Blogs

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events...

Measuring the Effectiveness of Your Security Controls

08:00 06 March in Blogs, Threat Research

Performing regular assessments to determine the efficacy of security programs is foundational to understanding the reliability of programs, security gaps, compliance issues, and whether security technology is ending up as “shelfware”. To gain continued program support and funding, information security teams are expected to...

The Benefits of Deception for SCADA Environments

14:00 01 March in Blogs, Energy

Recently, SC Magazine published an article covering several vulnerabilities that Positive Technologies found in GE supervisory control and data acquisition (SCADA) systems where an attacker could intercept passwords and disrupt utility and factory operations. While this particular vulnerability is limited to GE Proficy and...

RSA Key Sessions for 2017

09:52 14 February in Blogs

RSA 2017  is in full swing this week and there are a number of sessions that we are classifying as “must see”. We anticipate deception based detection technology to be covered both in formal meetings and information discussions during the conference. However, since...

Detection Budgets Rising Fast

16:26 25 January in Blogs, Research

This blog has regularly covered the alarming rise in security breaches over the last two years, and the assumption that most security teams are now aware that their prevention solutions are not enough to protect their companies. One measure organizations are taking is the...