Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

How to Stop Cyberattackers: Prevent Malicious Lateral Movement

Posted by Gil Shulman on Apr 10, 2018 10:56:38 AM

With cyber risk an executive- and board-level concern, it's not enough to try to prevent attackers from gaining entry to your network. Advanced, persistent attackers can still get through even the most advanced defenses. Once they're in, they have the arduous task of moving from their initial point of entry to their ultimate target. This is the time when attackers are most vulnerable—and where we, as defenders, have an opportunity to tip the balance in our favor.

Read More


SANS Institute To Test Illusive Networks Solution

Posted by the Illusive Networks team on Apr 27, 2017 2:48:37 PM

Growing awareness of illusive networks Deceptions Everywhere™ technology recently led SANS Fellow, Dr. Eric Cole, to test our solution. Not only did he aim to successfully deceive an attacker, he also evaluated illusive’s scalability, manageability, and believability. The results of his (unsuccessful) efforts to attack a network and escape detection are contained in a new SANS Product Review - Deception Matters: Slowing the Adversary with illusive networks.

Read More


Cyber Attacks Infograph - A Cyber Attacks Visualization

Posted by Hanan Levin on Mar 23, 2016 5:07:04 AM

 

Attackers are finding their way around perimeter defenses and into corporate networks—and IT security professionals are taking anywhere from 158 to 256 days to detect breaches.

Read More


Stay up to date!