As companies continue to get hammered by breaches, a clear gap in the effectiveness of many security portfolios becomes more evident with each attack. However, a new category of emerging security ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
Networks, cyberattacks, and the strategies used to stop them are continuously evolving. Security deception is an emerging cyber-defense tactic that allows researchers and information security ...
Deception tools have been growing in popularity over the past several years, but customers need to ensure they are using the technology to its fullest potential. The concept behind deception is fairly ...
TopSpin Security, Inc., has released what it calls the first enterprise internet of things (IoT) security solution based on leading deception technology, now available in the latest version of the ...
AI thrives on data but feeding it the right data is harder than it seems. As enterprises scale their AI initiatives, they face the challenge of managing diverse data pipelines, ensuring proximity to ...
Deceptive data is all around us. While some of it is less harmful than others, deception in defense has the potential to undermine all the technological improvements that are planned or have been ...
A tried-and-tested defensive security strategy, cyber deception deliberately plants decoys within an IT environment to detect and analyze malicious activity. These may include fake servers or domain ...
Contributors 5 ways deception tech is disrupting cybersecurity May 26, 2018 - 10:30 am Enterprises and their Security Operations Centers (SOCs) are under siege. Security events are being triggered ...
Deception technology has emerged as a hot practice - but not one that is necessarily on every enterprise's budgeting radar. Don Gray, CTO of PacketViper, talks about the emergence of deception ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results