Cybersecurity Threats: Why Attackers Know Your Network Better Than You Do

Posted by David Hunt on Apr 25, 2016 2:18:11 AM

 At this year’s inaugural Usenix Enigma security conference, crowds flocked to listen to an unconventional speaker.

Read More

5 Must-See Attractions at the Upcoming RSA Conference 2016

Posted by David Hunt on Feb 16, 2016 7:15:15 AM

We’re already over a month into 2016, and that means that the RSA® Conference 2016 is fast-approaching! On February 29th, the best and brightest minds in the cybersecurity industry will gather to network with each other and share the latest tech innovations.

After 25 years of RSA Conferences, this 26th iteration is particularly special—it’s the first time illusive networks will make an appearance.

Read More

Why Gartner Says Deception Technology is the Key to Fighting Cyber Threats

Posted by David Hunt on Feb 10, 2016 2:21:00 AM

Smart IT professionals already have defense-in-depth, equipping their networks with firewalls, anti-malware, intrusion detection, prevention - and all other manner of security technology.

Read More

Is Mobility the Greatest Enterprise Cyber Security Threat?

Posted by David Hunt on Feb 2, 2016 12:29:00 AM

Enterprise mobility has created a new field of weak endpoints for attackers to exploit via sophisticated cyber security threats.

Read More

Top 7 Cybersecurity Events to Keep on Your Radar in Q1 2016

Posted by David Hunt on Jan 29, 2016 11:00:00 AM

The security landscape changes on a daily basis as sophisticated attackers rush to innovate and exploit new attack vectors.

As a result, companies need to stay up to date on the latest trends and technologies to defend themselves. It almost seems as if on any given week in Q1 of 2016, you can find cybersecurity events to attend with experts from around the globe.

Read More

What Does Die Hard Have in Common with Defending the Industrial Ethernet?

Posted by Ofer Israeli on Jan 25, 2016 9:41:00 AM

When Bruce Willis began his role as John McClane in the first Die Hard movie in 1988, Ethernet connectivity was only just finding its place in the world.

Read More

Get Email Updates

Deception Technology
  

> Share Post