Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Illusive Networks Turns 100

Posted by Ofer Israeli on Mar 5, 2019 3:19:30 PM

On February 13th, we broke out the hats and balloons (read: hummus and beer) to celebrate Illusive’s 100th software sprint. For 100 releases now, we’ve been helping our customers—hundreds of organizations across industries—revolutionize their ability to stop advanced cyberattackers.

Read More


Diamond Deception - Can You Spot the Real Ones?

Posted by Gily Netzer on Jun 29, 2017 9:24:46 AM

The Antwerp World Diamond Center (AWDC) heist is one of the most notorious robberies in history. The AWDC used elaborate security mechanisms to protect diamonds, including a private security force, a lock with 100 million possible combinations, infrared heat detectors, a seismic sensor, Doppler radar and a magnetic field. After planning an attack for four years, the thieves ultimately managed to breach every aspect of the preventive defense system. They made off with about $115 million in diamonds, limited not by the number of diamonds they could get their hands on, but by their physical ability to carry them all. 

Read More


Best-of-Breed Deception Technology Gets Nod from Microsoft Ventures

Posted by the Illusive Networks team on Jan 24, 2017 4:02:48 PM

Cybersecurity start-ups have seen a slowdown from investment firms.

Based on an article published by Fortune, private investors pumped $3.3 billion into 229 cybersecurity deals in 2015, according to data from CB Insights.  But the slowdown of funding started to build early last year and investments became extremely difficult to secure in the second half of 2016.   Investors are looking for unique solutions with a broad range of products and services.  

Today, we’re proud to announce a strategic investment by Microsoft Ventures.

Read More


Stay up to date!