Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Beth Ruck

Recent Posts

Deception Platforms Noted as “High” Benefits Rating by Leading Industry Analyst Firm

Posted by Beth Ruck on Jul 31, 2018 3:04:35 PM

What a difference a year makes.

In 2018, we find deception platforms listed with a “High” Benefits Rating in Gartner’s Hype Cycle for Threat-Facing Technologies2018.

Read More


Digital Transformation Calls for Threat Detection Early in the Cyber Kill Chain

Posted by Beth Ruck on Jul 27, 2018 1:02:22 PM

It goes without saying that digital transformation—the reengineering of core business processes leveraging digital technology—dramatically increases cyber risk for most organizations. It usually results in greater avenues of connectivity, collection of richer data from more sources, use of cloud services, extension of trust to more people and entities, and incorporation of smart devices in one form or another.

Read More


Mitigating ATM Threats from the Inside Out

Posted by Beth Ruck on Jul 25, 2018 3:38:23 PM

 ATMs are literally boxes of cash—too good for criminals of any stripe to pass up. When ATMs first emerged, thieves used brute-force tools like crowbars, explosives, and propane torches to remove the ATM machine itself or get at the cash inside. As recently as April, three men were charged in Salt Lake City, UT, for trying to blow up ATMs and steal the cash. 

Read More


Protecting Growing Healthcare Organizations from Advanced Attackers

Posted by Beth Ruck on Mar 12, 2018 11:10:59 AM

Digitization and digital transformation in healthcare are delivering amazing advances in everything from diagnostic imaging and patient monitoring to medication safety, insurance claims processing, medical devices, and genetic research. As healthcare organizations reap significant benefits from innovation, they also must protect themselves and their patients from cyber attackers who develop increasingly sophisticated attack tools and methodologies.

Read More


The History of Deception Technology: Applying Ancient Tactics to Counter Cyber Security Threats

Posted by Beth Ruck on Feb 5, 2018 9:21:39 AM

What do enterprise security teams have in common with Hannibal at the Battle of Cannae in 216 B.C.? A lot. Both face an onslaught of adversaries. Both have valuable reputations and territory (or markets) at stake. And both need a way to outdistance enemies by enlisting new tactics. With today’s cyberattacks, yesterday’s approaches are not enough. As it did for Hannibal, deception offers a way to turn attackers’ own methods against them. The history of deception shows that weapons and tactics might change, but the ability to make an adversary act on something that isn’t real offers modern enterprise defenders a new arsenal of tools.

Read More


From Honeypots to Endpoint-Based Deception: Deception Becomes a Cybersecurity “Must-Have”

Posted by Beth Ruck on Dec 7, 2017 8:22:48 AM

It goes without saying that rigorous security controls are irreplaceable. But no matter how strong an organization’s cybersecurity defenses are, determined attackers will still get in. Whether malicious insiders or external actors, persistent attackers fly below the radar and reside for months inside a network. They’re patient, studying the infrastructure and carefully planning their attack because what they’re typically after are the crown jewels of your business: essential data volumes, intellectual property, financial transactions, or revenue-dependent business operations.

Read More


Stay up to date!