Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

GDPR Compliance: Personal Data Privacy and Beefing Up Data Security

Posted by Guy Rosenthal on Dec 11, 2018 10:35:53 AM

The intersection between cybersecurity and data privacy is making front-page news these days. The General Data Protection Regulation (GDPR), adopted by the European Union in 2016 and implemented in May 2018, represents a comprehensive regulatory effort with the objective of protecting consumer data and privacy. Organizations, or “controllers” of data in the language of the laws, must put in place “appropriate technical and organisational measures” to implement the data protection principles. There have been other legislative efforts in recent years dedicated to consumer data protection - the Dodd–Frank Wall Street Reform and Consumer Protection Act in the U.S. being one of them (though some of those regulations have since been removed or eased), but GDPR has been the most extensive.

Read More


Four Quick Thoughts about the Marriott Breach

Posted by Ofer Israeli on Nov 30, 2018 2:28:58 PM

My phone’s been ringing this morning from people wanting to talk about the massive Marriott breach — the revelation that private data associated with up to 500 million people may have been compromised. I’m sure there’s a lot more to learn from the details, but in the meantime, I’ll take a quick minute to jot down some initial thoughts:

Read More


Beyond the Headlines - What Happens After a Data Breach Announcement?

Posted by the Illusive Networks team on Dec 29, 2015 5:40:18 AM

When yet another headline about a large-scale data breach scrolls across your newsfeed, you might worry about the security of your company and hope it doesn’t happen to you. But after the initial shock of a breach, most people stop thinking about it.

Read More


The Evolution of Cyber Attackers - The 4 Key Profiles You Need to Know

Posted by the Illusive Networks team on Dec 21, 2015 5:08:00 AM

Cyber security was pretty simple back in the 1990s. Anti-virus software and firewalls offered plenty of firepower to combat attacks that were more annoying than dangerous.

But that world is gone.

Cyber Attackers exist on a spectrum now and they have ever since the Love Bug virus hit the scene in 2000, stealing some $10 billion from 20 different countries.

Read More


How Vulnerable Is Your Industry to Cyber Crime?

Posted by the Illusive Networks team on Dec 16, 2015 7:36:00 AM

You don’t need a long report to tell you that cyber crime is on the rise. You’ve seen the news—major companies like JP Morgan Chase, Anthem, LastPass, CVS and more have all fallen victim to data breaches in 2015.

The truth is that any company harboring sensitive customer information could become the target of a sophisticated cyber attacker.

That being said, there are certainly industries that are more vulnerable to attacks. Let’s take a closer look at four of the most vulnerable industries—financial services, healthcare, insurance and retail.

Read More


Why Aren’t Cyber Criminals Being Brought to Justice?

Posted by the Illusive Networks team on Dec 13, 2015 5:59:40 AM

Businesses of all size have their hands full with the 80 to 90 million cyber attacks that are launched every year. However, with 70% of these attacks going undetected, it shouldn’t come as a surprise that most cyber crime goes unpunished.

Read More


Stay up to date!