All Blog Posts

Cover image of this blog post

Deception Plays A Large Role in NIST SP 800-160

7 min read

Discover how NIST SP 800-160 promotes deception for building cyber resilience through a systems engineering view point.

Cover image of this blog post

Cyber Deception Has Use Cases You Aren't Thinking Of

4 min read

This blog post explores three less standard use cases for cyber deception.

Cover image of this blog post

Uncovering a Crypto Turfwar with Cloud Decoys

8 min read

Defused cloud decoys help discover an online cryptomining turf war. Explore how deception technologies broaden defender intelligence about adversary motivations.

Cover image of this blog post

What is Deception Technology

6 min read

Deception technologies help security teams fight back by creating enticing decoy assets within their network that attackers can’t resist interacting with.

Cover image of this blog post

Cyber Deception VS Honeypots

5 min read

Cyber deception and honeypots are related concepts, but often used interchangeably. This blog post points out the differences between the two.

Cover image of this blog post

Three Threat Vectors to Watch for in H2 of 2024

4 min read

Three Threat Vectors to Watch for in the second half of 2024, and their deceptive countermeasures

Cover image of this blog post

Misconceptions of AI-Driven Attacks in Infosec

4 min read

Attackers won't need magical new techniques to succeed. This should worry us.

Cover image of this blog post

Revisiting CVE-2021-34527, also known as PrintNightmare

5 min read

Exploring how you can use older vulnerabilities as part of effective deception operations

Cover image of this blog post

Backlog Crisis at the National Vulnerability Database

4 min read

The NVD is struggling with a backlog of thousands of unprocessed CVEs, impacting CPE to CVE mappings, and leaving defenders in the dark on the vulnerability risk potential of their assets.

Cover image of this blog post

Leveraging Deception in Zero Trust

2 min read

Deception contributes to achieving Zero Trust and defend from within the network perimeter.

Cover image of this blog post

Vulnerabilities Long Tail

3 min read

While new vulnerabilities continue to be discovered at a staggering pace, attackers focus on a much broader temporal spectrum. After all, it does not really matter which vulnerability is exploited, and older exploits are usually broadly available and stable.