Support Login
 

Archive

Deception Technology—Much more than a Honeypot

11:56 26 February in
0 Comments

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption - followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption. ...

Point-of-Sale System Attacks

14:38 20 December in
0 Comments

Researches the environment of POS device vulnerabilities, how POS attacks happen, the anatomy of a POS attack, and how deception plays a powerful role in protecting against cyber-attacks....