Blogs

The Benefits of Deception for SCADA Environments

14:00 01 March in Blogs, Energy
0 Comments

Written By: Carolyn Crandall, CMO & Chief Deception Officer -Recently, SC Magazine published an article covering several vulnerabilities that Positive Technologies found in GE supervisory control and data acquisition (SCADA) systems where an attacker could intercept passwords and disrupt utility and factory operations. While...

RSA Key Sessions for 2017

09:52 14 February in Blogs
0 Comments

RSA 2017  is in full swing this week and there are a number of sessions that we are classifying as “must see”. We anticipate deception based detection technology to be covered both in formal meetings and information discussions during the conference. However, since...

Detection Budgets Rising Fast

16:26 25 January in Blogs, Research
0 Comments

This blog has regularly covered the alarming rise in security breaches over the last two years, and the assumption that most security teams are now aware that their prevention solutions are not enough to protect their companies. One measure organizations are taking is the...

Staying Atop Your IoT Game with Visibility & Security

09:13 30 November in Blogs, IoT
0 Comments

No organization wants to become the next victim of a breach caused by the rapidly changing IoT and mobility-enabled landscape, where well-funded attackers continue to mount increasingly sophisticated assaults. With Verizon reporting that 70-90 percent of today’s malware is unique to a specific company, making...