Support Login
 

Blogs

Lights, Cameras, Hack(tion)

15:39 15 March in Blogs
0 Comments

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events...

The Benefits of Deception for SCADA Environments

14:00 01 March in Blogs, Energy
0 Comments

Written By: Carolyn Crandall, CMO & Chief Deception Officer -Recently, SC Magazine published an article covering several vulnerabilities that Positive Technologies found in GE supervisory control and data acquisition (SCADA) systems where an attacker could intercept passwords and disrupt utility and factory operations. While...

RSA Key Sessions for 2017

09:52 14 February in Blogs
0 Comments

RSA 2017  is in full swing this week and there are a number of sessions that we are classifying as “must see”. We anticipate deception based detection technology to be covered both in formal meetings and information discussions during the conference. However, since...