All Blog Posts

Deception Plays A Large Role in NIST SP 800-160
Discover how NIST SP 800-160 promotes deception for building cyber resilience through a systems engineering view point.

Cyber Deception Has Use Cases You Aren't Thinking Of
This blog post explores three less standard use cases for cyber deception.

Uncovering a Crypto Turfwar with Cloud Decoys
Defused cloud decoys help discover an online cryptomining turf war. Explore how deception technologies broaden defender intelligence about adversary motivations.

What is Deception Technology
Deception technologies help security teams fight back by creating enticing decoy assets within their network that attackers can’t resist interacting with.

Cyber Deception VS Honeypots
Cyber deception and honeypots are related concepts, but often used interchangeably. This blog post points out the differences between the two.

Three Threat Vectors to Watch for in H2 of 2024
Three Threat Vectors to Watch for in the second half of 2024, and their deceptive countermeasures

Misconceptions of AI-Driven Attacks in Infosec
Attackers won't need magical new techniques to succeed. This should worry us.

Revisiting CVE-2021-34527, also known as PrintNightmare
Exploring how you can use older vulnerabilities as part of effective deception operations

Backlog Crisis at the National Vulnerability Database
The NVD is struggling with a backlog of thousands of unprocessed CVEs, impacting CPE to CVE mappings, and leaving defenders in the dark on the vulnerability risk potential of their assets.

Leveraging Deception in Zero Trust
Deception contributes to achieving Zero Trust and defend from within the network perimeter.

Vulnerabilities Long Tail
While new vulnerabilities continue to be discovered at a staggering pace, attackers focus on a much broader temporal spectrum. After all, it does not really matter which vulnerability is exploited, and older exploits are usually broadly available and stable.