Support Login

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

 

Archive

image of a chess board

Cyber Deception: How To Build A Program

15:34 12 February in
0 Comments

Geoff Handcock, has been in cybersecurtity for 27 years. He has worked in military, intelligence community, civilian agencies and corporations, conducing cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group,...

clarifying-industry-misconceptions

Deception Myths: Clarifying Industry Misconceptions

11:51 28 January in
0 Comments

The earliest deception systems were used primarily for research and they were difficult to set up and maintain. Those preliminary experiences have led to some myths and misconceptions about deception. This paper will address and debunk those myths, while detailing how deception has evolved into...

Threat-Deception

Threat Deception for an Active Defense

15:42 25 January in
0 Comments

Attivo Networks® deception-based threat detection shifts the power to the defender with a unique approach that reduces risk, accelerates incident response, and improves the overall effectiveness and efficiency of existing security controls. To learn more about deception-based threat detection, view this document....

Image for authenticity paper

ThreatDefend Platform Feature Highlight : Authentic Deception

11:35 11 January in
0 Comments

At its core, deception technology relies on presenting an attacker with decoys and lures that are indistinguishable from real assets. Highly authentic decoys are vital for any organization looking to add deception technology for in-network threat detection. This feature highlight addresses the importance of authenticity...

Attivo Networks Deception Technology for Mergers and Acquisitions

10:59 04 October in
0 Comments

Deception technology can play a critical role in Mergers and Acquisition situations, providing vital detection and visibility capabilities for due diligence and post-merger integrations. Check out this white paper for more on the benefits of deception technology before, during, and after a merger/ acquisition scenario. ...