Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Daniel Brody

Daniel Brody

Recent Posts

Industry Analysts Offer a Full-Throated Endorsement of Deception Technology

Posted by Daniel Brody on Nov 21, 2019 4:01:58 PM

With hundreds of new technology trends and literally thousands of vendors vying for attention, its no wonder CSOs and other security professionals struggle to stay fully up to date. The barrage of marketing claims only complicates matters.

So Gartner’s recent research report, “Emerging Technologies and Trends Impact Radar: Security” (paywall) arrives as a balm for the beleaguered security professional, cutting through the noise to provide a snapshot of which new technologies truly offer a leg up on increasingly sophisticated attackers and threats. Among other recommendations in the report, Gartner suggests deception technology offers “easy to deploy, deterministic, and effective threat detection capabilities for enterprises of all sizes,” and here at Illusive Networks we couldn’t agree more.

Read More


Gartner Analyst Urges Businesses to Use Deception Technology

Posted by Daniel Brody on Sep 5, 2019 2:48:58 PM

Last week, Gartner held the latest iteration of its Security and Risk Management Summit in Mumbai, and Senior Director Analyst Gorka Sadowski echoed what Illusive has been saying for a while: the time has come for enterprises of all kinds to take advantage of next-generation deception technology. Sadowski divided his presentation into three sections, whose titles asked the following questions:

  • Is it the right time for deception solutions?
  • Are deception solutions right for any enterprise?
  • What’s the future outlook for deception platforms?
Read More


Next-Gen Deception Technology: Moving Beyond Honeypots

Posted by Daniel Brody on Aug 22, 2019 3:08:04 PM

Is it time for the proverbial “Honeypots are Dead” Post?

Returning from Black Hat earlier this month, I couldn’t help but reflect on how honeypots were still the first thing that came to mind when many attendees heard the word “deception.” It’s true that when deception technology first emerged years ago, honeypots were the most analogous technology to describe the way deception worked, in that a honeypot tries to trick an attacker into interacting with it. However, deception has come a long way since honeypots materialized in the 1990s and were first commercialized in the 2000s. Call the new generation of deception technology what you will, just don't call it a honeypot.

Read More


Capital One & Sephora Breaches Evince Usual Defense Limits

Posted by Daniel Brody on Jul 30, 2019 3:21:13 PM

One week after Equifax announced the settlement terms of its recent breach, two new breaches are making headlines. First, various outlets reported this week that Capital One, among the top 10 banks by asset size in the US, was victimized by a hacker that gained access to more than 100 million customer accounts and credit card applications in early 2019. The hack is one of the largest data breaches to ever hit a financial services firm. What got compromised? The stolen data includes 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers, 80,000 bank account numbers and an undisclosed number of names, addresses, credit scores, credit limits, balances and other personally identifiable information.

Read More


Stay up to date!