How councils can use deception to fight cybercrime
Many cybercriminals are opportunists and take the path of least resistance, aiming at targets that will enable them to make a quick profit with the least effort. ...
Many cybercriminals are opportunists and take the path of least resistance, aiming at targets that will enable them to make a quick profit with the least effort. ...
Deception technology is proving to be an innovative and successful approach for defending local governments against cybersecurity threats. Tuning into the news, one might easily get the impression that local councils are disproportionately impacted by cybersecurity incidents compared to many other industry sectors. Certainly in the US,...
The best way to keep up with the tactics that attackers use against us is through automated responses to high-fidelity events, and that is the promise that deception brings to cyber defenders. The talk will cover where deception technologies are today, the future of deception...
The premier naval conference and exposition on the West Coast, WEST is now in its 30th year of bringing military and industry leaders together. Co-sponsored by AFCEA International and the U.S. Naval Institute, WEST is the only event in which the makers of platforms and...
Suits & Spooks DC is the only international security summit where the attendees and speakers engage in discussion and debate of cyber/physical security challenges over the course of two days. World-class speakers will describe their vision of future threats and leading edge companies will exhibit...
Perhaps its constant state of change presents the most challenging characteristic of cybersecurity. Techniques, tools and tradecraft that worked last week may leave you vulnerable next week. Luckily the federal government doesn’t sit still. Agencies operate in an environment of continuously updated policy, guidance and technology. In...
The 2019 USDA Cybersecurity Expo will provide its active participants with information and resources on today's vulnerabilities, incidents, security lifecycle, risks and mitigations. It will also identify ways to work together and build a solid security foundation program to meet future challenges and trends in...
Tony Cole, CTO at Attivo Networks, sits down with FedScoop at the Security for Innovation Summit to discuss how government security has evolved with the introduction of cloud. Watch Now>>>...
Attivo Networks has named FireEye veteran Tony Cole as its CTO as the company looks to boost its presence in the government, financial services, and oil and gas verticals. The Fremont, Calif.-based vendor brought Cole on board to help Attivo deliver more clarity to the...
A hacker is selling stolen credentials that purportedly give access to servers of the US Navy, Centers for Disease Control, US Postal Service, and other US government sites. Listings for the accounts were found recently by Tech Insider on a dark web marketplace called The Real...
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.