This session provides an introduction to deception detection, and body language in the world we live in. The presentation begins with a look at micro-expressions and then moves onto verbal and para-verbal indicators of deception, as well and non-verbal indicators of deception. Practical exercises and examples are...
Deception technology has emerged as a hot practice - but not one that is necessarily on every enterprise's budgeting radar. Don Gray, CTO of PacketViper, talks about the emergence of deception technology and how security leaders can make the case - and find the budget - for its usage.
The threat landscape grows more daunting and diverse each day. Security teams are scrambling to keep up with attacks targeting end users. These attacks are stealthier and harder to detect than ever before.
Download this white paper to learn more about:
Using AI to analyze threat scenarios;
Developing static...
Even with a growing variety of security tools at their disposal, detection and response is a challenge for all organizations. It took most US companies an average of 191 days to detect a breach in 2017 - so what's the delay in breach detection and response?
Download this white paper to learn more about:
The lack...
In just a few years' time, deception technology has matured to become a critical - and recommended - element of fundamental cybersecurity defense. Tony Cole, CTO of Attivo Networks, discusses critical success factors for deploying deception.
Deploying deception technology can give organizations a leg up when it comes to more quickly spotting and responding to data breaches, provided they configure and utilize the technology appropriately, says Rocco Grillo of the consultancy Alvarez & Marsal.
Deception technology, adversary intelligence and early detection can help counter spoofing and phishing attacks, says Sal Stolfo, the founder and CTO of Allure Security.
Finding a security framework comprehensive enough to serve the tactical needs of security operations teams can be difficult. MITRE ATT&CK is the first framework to meet these needs and provide a basis for real-time security operations improvements.
Download this white paper to learn more about:
The five essential...
This edition of the ISMG Security Report discusses the latest improvements in deception technology and how best to apply it. Also featured: a report on the growth of mobile fraud, plus insights on Merck's experience recovering from a NotPetya attack.
Deception technology is attractive in that it offers - in theory - low false positives and critical clues to attackers' methodologies. But the benefits depend on its ability to fool attackers and whether organizations can spare the time to fine-tune it.
For results-oriented security leaders seeking to rationalize their security stack, deception solutions can solve more than just the internal threat detection problem. This session will cover case studies where deception is used to not only amplify internal threat detection, but also improve threat prevention and...
Deception technology has been on security leaders' radar some time, but now it is becoming accessible to smaller organizations. And in their most recent analyses, market analysts give deception technologies kudos for improved sophistication and maturity.
Deception focuses on deploying assets - such as lures, bogus...
Deception technology is becoming more sophisticated, enabling organizations to battle against emerging threats, says Alissa Knight, senior analyst at Aite Group, a research and advisory company.
The latest edition of the ISMG Security Report analyzes the significance of fines against British Airways and Marriott for violations of the EU's GDPR. Also featured are discussions of California's privacy law as a model for other states and the next generation of deception technologies.
With attackers continuing to hammer weaknesses in software, organizations must prioritize application security more than ever, says Ian Ashworth of Synopsys. Thankfully, developers and middle management - bolstered by agile methodologies and DevOps - are increasingly leading the charge.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.