Support Login

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

 

Archive

image of a chess board

Cyber Deception: How To Build A Program

15:34 12 February in
0 Comments

Geoff Handcock, has been in cybersecurtity for 27 years. He has worked in military, intelligence community, civilian agencies and corporations, conducing cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group,...

Threat Deception for the Legal Sector

15:41 05 July in
0 Comments

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the...

Deception for a SWIFT Defense

13:30 12 June in
0 Comments

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of...

Deception Technology—Much more than a Honeypot

11:56 26 February in
0 Comments

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption - followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption....