Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Four Quick Thoughts about the Marriott Breach

Posted by Ofer Israeli on Nov 30, 2018 2:28:58 PM

My phone’s been ringing this morning from people wanting to talk about the massive Marriott breach — the revelation that private data associated with up to 500 million people may have been compromised. I’m sure there’s a lot more to learn from the details, but in the meantime, I’ll take a quick minute to jot down some initial thoughts:

Read More


Anticipating Cyber Monday: Meet and Exceed PCI-DSS Compliance

Posted by Guy Rosenthal on Nov 20, 2018 11:37:16 AM

In 2004, the Payment Card Industry Data Security Standard (PCI DSS) became a fact of life for organizations that accept payment via credit or debit cards. In that year, the leading card issuers rolled out the first iteration of its security standard, designed to improve protection of payment systems as credit card data became a prime target for cyberattackers. Today, even as organizations have entire teams dedicated to PCI compliance, one consumer business after another—including Macy’s, Adidas, Panera Bread and Chili’s—have been breached, resulting in exposure of cardholder data.

Read More


Merger Mania: A Mega-Opportunity for Cyberattackers

Posted by Ofer Israeli on Nov 13, 2018 7:02:00 AM

More than $2.5 trillion in mergers were announced in the first half of 2018[1]a new record. Ranked by value of the deal, energy and power deals led, followed by media and entertainment, with healthcare and industrials close behind. Industries are converging and organizations are using acquisitions, divestitures, and other forms of asset remix to reposition their businesses. For example, there are numerous mergers among pharmaceutical, life sciences, and biotech companies as they seek to gain traction in a highly fragmented market. EY predicts that the total value of life sciences M&A will surpass $200 billion in 2018. According to Deloitte, technology acquisition is the primary driver of M&A pursuits, ahead of expanding customer bases in existing markets, and adding products or services[3].

Read More


Rethinking Healthcare Cybersecurity: Focus on the Attacker, not the Attack

Posted by Ofer Israeli on Nov 12, 2018 11:30:50 AM

At a recent industry event, I got to chatting with the CISO of a major children’s hospital. Over a beer, he shared with me the challenges he faces daily. Our far-reaching conversation covered nation-state actors enticing students to exfiltrate clinical trial test results, to his search for a secure USB port cover for patient-facing devices. Maybe it was the beer, but as he described his tribulations, each to me worse than the next, his enthusiasm and energy grew. Every so often he stopped to shake his head in disbelief at his own story as if to say, “Even I can’t believe how bad this is…” 

Read More


Deception Platforms Noted as “High” Benefits Rating by Leading Industry Analyst Firm

Posted by Beth Ruck on Jul 31, 2018 3:04:35 PM

What a difference a year makes.

In 2018, we find deception platforms listed with a “High” Benefits Rating in Gartner’s Hype Cycle for Threat-Facing Technologies2018.

Read More


Digital Transformation Calls for Threat Detection Early in the Cyber Kill Chain

Posted by Beth Ruck on Jul 27, 2018 1:02:22 PM

It goes without saying that digital transformation—the reengineering of core business processes leveraging digital technology—dramatically increases cyber risk for most organizations. It usually results in greater avenues of connectivity, collection of richer data from more sources, use of cloud services, extension of trust to more people and entities, and incorporation of smart devices in one form or another.

Read More


Stay up to date!