Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Deception Platforms Noted as “High” Benefits Rating by Leading Industry Analyst Firm

Posted by Beth Ruck on Jul 31, 2018 3:04:35 PM

What a difference a year makes.

In 2018, we find deception platforms listed with a “High” Benefits Rating in Gartner’s Hype Cycle for Threat-Facing Technologies2018.

Read More


Digital Transformation Calls for Threat Detection Early in the Cyber Kill Chain

Posted by Beth Ruck on Jul 27, 2018 1:02:22 PM

It goes without saying that digital transformation—the reengineering of core business processes leveraging digital technology—dramatically increases cyber risk for most organizations. It usually results in greater avenues of connectivity, collection of richer data from more sources, use of cloud services, extension of trust to more people and entities, and incorporation of smart devices in one form or another.

Read More


Mitigating ATM Threats from the Inside Out

Posted by Beth Ruck on Jul 25, 2018 3:38:23 PM

 ATMs are literally boxes of cash—too good for criminals of any stripe to pass up. When ATMs first emerged, thieves used brute-force tools like crowbars, explosives, and propane torches to remove the ATM machine itself or get at the cash inside. As recently as April, three men were charged in Salt Lake City, UT, for trying to blow up ATMs and steal the cash. 

Read More


Cyberthreat Outlook 2018: What to Expect Next

Posted by Ofer Israeli on Mar 14, 2018 3:32:47 AM

As we survey the threat landscape, two things are certain—targeted attacks and advanced persistent threats (APTs) are here to stay, and organizations face increased risk from advanced attacks compared to the past two years. Several existing trends will continue, and we’re seeing attackers refine their tools in ways that will drive new trends in the coming months.

Read More


Case Study: Deception Catches an Insider Threat

Posted by Hadar Yudovich on Dec 21, 2017 4:16:21 AM

People usually associate “advanced persistent threat” (APT) with malicious outsiders—nation-state or other sophisticated attackers. Generally, once an APT attacker has established an initial foothold, they conduct “low-and-slow”-style attacks involving a prolonged period of reconnaissance and lateral movement. Insider threats are usually thought of as intentional (or sometimes accidental) acts of data theft or other compromise committed by trusted users who know their way around and have legitimate, open access to sensitive assets.

Read More


From Honeypots to Endpoint-Based Deception: Deception Becomes a Cybersecurity “Must-Have”

Posted by Beth Ruck on Dec 7, 2017 8:22:48 AM

It goes without saying that rigorous security controls are irreplaceable. But no matter how strong an organization’s cybersecurity defenses are, determined attackers will still get in. Whether malicious insiders or external actors, persistent attackers fly below the radar and reside for months inside a network. They’re patient, studying the infrastructure and carefully planning their attack because what they’re typically after are the crown jewels of your business: essential data volumes, intellectual property, financial transactions, or revenue-dependent business operations.

Read More


Stay up to date!