Support Login

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

 

Archive

image of a chess board

Cyber Deception: How To Build A Program

15:34 12 February in
0 Comments

Geoff Handcock, has been in cybersecurtity for 27 years. He has worked in military, intelligence community, civilian agencies and corporations, conducing cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group,...

M&A Customer Case Study

10:41 09 October in
0 Comments

This white paper will delve into some of the information security challenges organizations are likely to face during the M&A process, and how using deception technology to identify potential issues and will make the infrastructure integration process smoother and more secure....

Attivo Networks Deception Technology for Mergers and Acquisitions

10:59 04 October in
0 Comments

Deception technology can play a critical role in Mergers and Acquisition situations, providing vital detection and visibility capabilities for due diligence and post-merger integrations. Check out this white paper for more on the benefits of deception technology before, during, and after a merger/ acquisition scenario. ...

Threat Deception for the Legal Sector

15:41 05 July in
0 Comments

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the...