Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Hanan Levin

Hanan Levin

Recent Posts

Finally, You Can Block Ransomware from Taking Your Company Hostage

Posted by Hanan Levin on Jul 21, 2016 11:05:01 AM

Between April 2015 and March 2016, there were 2,315,931 reported ransomware attacks

Read More

16 Key Takeaways from the 2016 Verizon Data Breach Investigations Report

Posted by Hanan Levin on Jun 21, 2016 12:30:51 AM

For 9 straight years now, Verizon has released the Data Breach Investigations Report to give cybersecurity professionals a detailed look into the threat landscape. The report is meant to help security teams keep up with increasingly sophisticated attackers. 

Read More

5 Network Security Vulnerabilities & Threats Found by Attacker View

Posted by Hanan Levin on Jun 13, 2016 2:31:42 AM

As one half of the illusive 3.0 solution, Attacker View™ gives companies an opportunity to see their unique vulnerabilities to information security threats. This provides an advantage that most organizations have yet to benefit from in the cybersecurity context.

Read More

Keep Cyber Attackers in an Endless Maze with Deception Technology

Posted by Hanan Levin on Jun 9, 2016 12:16:40 AM

Cyber attackers only need one small crack in a security plan to invade and jeopardize an entire organization. As IBM and Ponemon Institute reported in their 2015 Cost of Data Breach Study: Global Analysis, this is becoming a costly problem for today’s businesses.

Read More

Cyber Attacks Infograph - A Cyber Attacks Visualization

Posted by Hanan Levin on Mar 23, 2016 5:07:04 AM


Attackers are finding their way around perimeter defenses and into corporate networks—and IT security professionals are taking anywhere from 158 to 256 days to detect breaches.

Read More

How to Stay Ahead of Cyber Attackers and Cyber Thieves?

Posted by Hanan Levin on Mar 22, 2016 2:08:00 AM

All of the daunting statistics about data breaches and cybersecurity failures that we’ve all been inundated with often point to the fact that sophisticated cyber attackers have figured out how to bypass common preventative measures.

Read More

Stay up to date!