Support Login
 

Deception

Detecting MITM attackers

Active Defense 101

12:58 11 May in Blogs, Deception
0 Comments

By: Carolyn Crandall, Chief Deception Officer/CMO From Sun Tzu to George Washington, some of the greatest military strategists in history have lived by the philosophy that “the best defense is a good offense,” and the proverb also rings true when it comes to IT...

Tony Cole -Chief Technology Officer

Observations on the Cisco Switch Attack

16:44 06 April in Blogs, Deception
0 Comments

By Tony Cole Nation-states continue to probe all kinds of systems for vulnerabilities, and unfortunately they’re often successful at finding a path into almost any enterprise they want to compromise. Cisco reported this week that their Smart Install protocol was being ‘misused’ as an avenue...

Deception and Counterintelligence

14:25 04 April in Blogs, Deception
0 Comments

By: Joseph Salazar When someone mentions Counterintelligence (CI), James Bond, the IMF’s Ethan Hunt, and three letter agencies like the FBI, CIA, and MI5 come to mind for most people.  They may think that CI is limited only to intelligence agencies, government organizations, or the...