Read our latest RESEARCH
Unleashing the power of deceptive techniques in cloud threat detection and response
In this blog post, we’ll explore the value of incorporating deceptive techniques within a CDR framework and delve into the world of detection engineering
9 principles for practitioner-focused cybersecurity software
Our good friend Ross Haleliuk from Ventures in Security has just released an article on 9 principles for security software. Naturally, we got curious. So, during our flight back from BSides and RSA, we seized the opportunity to consider our own performance
The Evolution of Deception Technology
Cybercriminals regularly use deceptive techniques as part of their campaigns because it’s effective, quick, and inexpensive
What is deception technology
Deception technology enables detection without compromising real data by using decoys or traps to trick cyber criminals into stealing fake data