Deceptions Everywhere ®

The Illusive Networks Blog

Trying to Lower the Cost of Data Breaches? Address the Detection “Lag”

Posted by Beth Ruck on Jul 27, 2017 9:30:23 AM

By annually tracking the cost of data breaches, Ponemon Institute has helped instill broad awareness that these costs continue to increase. As noted in our report earlier this year, Ponemon also offers some insight on steps companies can take to minimize these costs, citing the positive impact of investment in pre-established incident response teams, employee training, and enhanced encryption.

Read More


16 Key Takeaways from the 2016 Verizon Data Breach Investigations Report

Posted by Hanan Levin on Jun 21, 2016 12:30:51 AM

For 9 straight years now, Verizon has released the Data Breach Investigations Report to give cybersecurity professionals a detailed look into the threat landscape. The report is meant to help security teams keep up with increasingly sophisticated attackers. 

Read More


Keeping Cyber Attackers in an Endless Maze with Deception Technology

Posted by Hanan Levin on Jun 9, 2016 12:16:40 AM

Cyber attackers only need one small crack in a security plan to invade and jeopardize an entire organization. As IBM and Ponemon Institute reported in their 2015 Cost of Data Breach Study: Global Analysis, this is becoming a costly problem for today’s businesses.

Read More


5 Takeaways from Kaspersky’s 2015 IT Security Risks Survey

Posted by David Hunt on Mar 31, 2016 9:56:44 AM

International software security group Kaspersky Lab recently published their findings from the 2015 Global IT Security Risks Survey, which included responses from 5564 IT professionals across 38 countries.

Read More


Expert Corner: Joseph Carson Talks Customer Data Protection in the EU

Posted by David Hunt on Feb 17, 2016 9:36:27 AM

We recently spoke with Joseph Carson, the Head of Cyber Security at ESC Global Security and Head of Product at Arellia, to discuss the current state of data protection as well as the evolution of cyber insurance.

Read More


Is Mobility the Greatest Enterprise Cyber Security Threat?

Posted by David Hunt on Feb 2, 2016 12:29:00 AM

Enterprise mobility has created a new field of weak endpoints for attackers to exploit via sophisticated cyber security threats.

Read More


Stay up to date!