Recently Fred Cohen sent me a review copy of one of his books, _Frauds, Spies, and Lies and How to Defeat Them_. At 234 pages, it’s a delightful read, and I went through it pretty much in one session ...
Trick attackers into exposing themselves when they breach your systems using decoys that are easy to deploy and act like tripwires Image: Adobe Stock You can’t afford to be reactive with security any ...
As software supply chain attacks increase, cybersecurity talent wanes, and alert fatigue leads to burnout, an always-on, defense-first mentality will no longer suffice. While many defense strategies ...
In my previous article, I examined the characteristics of the 2016 U.S. election interference events from a cybersecurity point of view. The amount of publicity surrounding the 2016 events enables us ...
PEN testing identifies critical vulnerabilities and drives focused remediation efforts. Cyber deception makes tests more realistic and reveals detection gaps. Deception techniques generate actionable ...