Blog

Using cyber deception to catch entrenched attackers

Monday, September 17, 2018
When we talk about deception, we usually talk about detecting and preventing an attacker from executing lateral movement...

Cryptocurrency deception: Don’t trust that wallet!

Monday, August 20, 2018
Since cryptocurrency, blockchain, and smart contracts have been in the news quite a bit recently, we thought we’d go a...

Deception and the SingHealth breach: the anatomy of an attack that could have been prevented

Monday, July 23, 2018
Personal data of 1.5 million SingHealth patients has been compromised in what is being described as Singapore's worst da...

General Data Protection Regulation and Deception Solutions

Thursday, July 5, 2018
The GDPR is the European Union’s General Data Protection Regulation. Its main objective is to protect EU residents’ ...

Introducing caffeine deception

Sunday, April 1, 2018
What is the most valuable asset in your organization? Code? Information? Servers? All of these are artifacts—jus...

Anne Arundel County: The Cyber Security Capital of the Free World?

Thursday, February 15, 2018
Update:  I wrote a blog that was published back on March 30, 2017, entitled Cyber Education: Why Not Start Early?...
That's all i could find (for now)