Support Login

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

 

Blogs

Detecting MITM attackers

Active Defense 101

12:58 11 May in Blogs, Deception
0 Comments

By: Carolyn Crandall, Chief Deception Officer/CMO From Sun Tzu to George Washington, some of the greatest military strategists in history have lived by the philosophy that “the best defense is a good offense,” and the proverb also rings true when it comes to IT...

Tony Cole -Chief Technology Officer

Observations on the Cisco Switch Attack

16:44 06 April in Blogs, Deception
0 Comments

By Tony Cole Nation-states continue to probe all kinds of systems for vulnerabilities, and unfortunately they’re often successful at finding a path into almost any enterprise they want to compromise. Cisco reported this week that their Smart Install protocol was being ‘misused’ as an avenue...