Blog

The recent US healthcare database breaches: a look at what's happening

Even cyber intelligence seems to be about sensationalism in the media today. Intelligence is about gathering info, processing ...
shutterstock_445236850

Using cyber deception to gain visibility and control of IoT devices

Cyber deception is very effective in IoT security, although naturally there is a limit to that effectiveness. Security ...

Where does cybersecurity fit within your organization?

Where within your organization does the cybersecurity function fall, and to whom do they report – the CEO, ...

The Ukraine power grid hack: Why did the attackers succeed?  

Last December, the lights went out in the Ivano‐Frankivsk region of Ukraine, and over 225,000 people were left ...

Anonymous’ ‘Hack Israel Day’ Could Impact the Entire World

(Originally published on re/code) Israel was hit by a massive cyber offensive this week. But unlike other attacks (APTs, ...

The FBI-Apple case: the next encryption and privacy firestorm

(Originally published on Information Week's Dark Reading)   The startling events over the last few weeks in the San Bernardino ...

APT attacks and false flag tactics: How can we spot the fakes?

The false flag tactic originated in naval combat in the days of yore. Flags were used to communicate ...

Did TeslaCrypt kill its ransomware so it could launch a new product?

(Published on VentureBeat) Last week saw an unusual development in the field of ransomware: The cybercriminal group that operates the ...

Cyber Deception Startup Cymmetria Named “Cool Vendor” By Gartner

Cymmetria, a developer of next-generation, comprehensive cyber deception solutions, today announced it has been named a 2016 Cool ...

Research: Cyber Deception Will Be Standard For Thousands Of Organizations By 2018

Today, almost all organizations have a defense grid of firewalls, IDS/IPS, and SIEMs. This baseline grid will soon ...