Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

16 Key Takeaways from the 2016 Verizon Data Breach Investigations Report

Posted by Hanan Levin on Jun 21, 2016 12:30:51 AM

For 9 straight years now, Verizon has released the Data Breach Investigations Report to give cybersecurity professionals a detailed look into the threat landscape. The report is meant to help security teams keep up with increasingly sophisticated attackers. 

Read More


Keep Cyber Attackers in an Endless Maze with Deception Technology

Posted by Hanan Levin on Jun 9, 2016 12:16:40 AM

Cyber attackers only need one small crack in a security plan to invade and jeopardize an entire organization. As IBM and Ponemon Institute reported in their 2015 Cost of Data Breach Study: Global Analysis, this is becoming a costly problem for today’s businesses.

Read More


5 Takeaways from Kaspersky's 2015 Global IT Security Risks Survey

Posted by the Illusive Networks team on Mar 31, 2016 9:56:44 AM

International software security group Kaspersky Lab recently published their findings from the 2015 Global IT Security Risks Survey, which included responses from 5564 IT professionals across 38 countries.

Read More


Expert Corner: Joseph Carson Talks Customer Data Protection in the EU

Posted by the Illusive Networks team on Feb 17, 2016 9:36:27 AM

We recently spoke with Joseph Carson, the Head of Cyber Security at ESC Global Security and Head of Product at Arellia, to discuss the current state of data protection as well as the evolution of cyber insurance.

Read More


Cybersecurity Threats and Enterprise Mobility

Posted by the Illusive Networks team on Feb 2, 2016 12:29:00 AM

Enterprise mobility has created a new field of weak endpoints for attackers to exploit via sophisticated cyber security threats.

Read More


Cyber Security Team Structure: 7 Key Roles & Responsibilities

Posted by the Illusive Networks team on Dec 30, 2015 7:00:00 AM

CISOs have been content to deploy point solutions and incremental enhancements to protect a relatively small pool of assets. However, incrementally deploying solutions like next-gen firewalls, IPSs, IDSs, web application firewalls, data leakage protection systems and more isn’t enough because every company should already have them in place.

CISOs must take a more proactive stance when it comes to modern cyber security—and it all starts with building a security team capable of keeping up with sophisticated cyber criminals.

Read More


Stay up to date!