This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. Every CISO knows it’s not enough to just use prevention tools to try to keep attackers out of the ...
In this episode of eSpeaks, Jennifer Margles, Director of Product Management at BMC Software, discusses the transition from traditional job scheduling to the era of the autonomous enterprise. eSpeaks’ ...
TopSpin Security, Inc., has released what it calls the first enterprise internet of things (IoT) security solution based on leading deception technology, now available in the latest version of the ...
Networks, cyberattacks, and the strategies used to stop them are continuously evolving. Security deception is an emerging cyber-defense tactic that allows researchers and information security ...
Deception tools have been growing in popularity over the past several years, but customers need to ensure they are using the technology to its fullest potential. The concept behind deception is fairly ...
AI thrives on data but feeding it the right data is harder than it seems. As enterprises scale their AI initiatives, they face the challenge of managing diverse data pipelines, ensuring proximity to ...
Endpoint security technology developer Symantec on Wednesday introduced the integration of its Symantec Endpoint Protection software with some new features and add-ons via a common API. The company ...
A tried-and-tested defensive security strategy, cyber deception deliberately plants decoys within an IT environment to detect and analyze malicious activity. These may include fake servers or domain ...
SAN MATEO, CA — July 26, 2016 — TrapX™, a global leader in advanced cyber security defense, today announced that it has released version 5.2 of its DeceptionGrid™ platform. Available in Q3 2016, the ...
Deception technology has emerged as a hot practice - but not one that is necessarily on every enterprise's budgeting radar. Don Gray, CTO of PacketViper, talks about the emergence of deception ...
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL ...
Deceptive data is all around us. While some of it is less harmful than others, deception in defense has the potential to undermine all the technological improvements that are planned or have been ...