4 min
Cloud Security
Grocery Delivery Apps: Trading Convenience for Credentials
Adoption of food apps has been incredibly fast and they are now a ubiquitous part of everyday culture. However, the tradeoff for that convenience is risk.
1 min
Lost Bots
[The Lost Bots] Episode 4: Deception Technology
In this episode of The Lost Bots, Jeffrey talks one-on-one with you about one of his favorite subjects: deception technology.
4 min
Deception Technology
Deception Technology: Can It Detect Intruders Earlier in their Attack Chain?
Every infosec conference is chatting about the Attack Chain, a visual mapping of
the steps an intruder must take to breach a network. If you can detect traces of
an attack earlier, you not only have more time to respond, but can stop the
unauthorized access to monetizable data and its exfiltration.
Even as attackers and pen-testers continue to evolve their techniques, the
Attack Chain continues to provide a great baseline framework to map out your
security detection program.
Many of today's