Distributed Deception

Blog

The Reality of Deception for Cyber Resilience

Dr. Donnie Wendt's presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience. He will elaborate on this idea in his keynote Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience on Thursday, May 12, 2022, 11:30…

Blog

SentinelOne acquires Attivo Networks: A big leap forward to Security with Identity

SentinelOne has announced that they will acquire Attivo Networks, a leading Distributed Deception Platform (DDP) and Identity Threat Detection & Response (ITDR) solution provider. This appears to be a good move for SentinelOne, which is a leading Endpoint Protection Detection &…

Video

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and…

Video

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the…

Webinar

Sep 12, 2019: How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the…