Deception Technologies

Followings are the interesting blogs from Deception Technologies domain:

To Know more about Deception Technology Products & Services,

Sign In to FireCompass for FREE !!

Breach Trends and Insights – October 2020

This report summarises the top breaches between mid – September till 15th October 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.  Most common Breach trends identified :  Elasticsearch (Non-password protected database server) Operational Errors – (exposed system with… Read More »Breach Trends and Insights – October 2020

Press Release: New AI Technology Mimics Thousands of Hackers

New AI Technology Mimics Thousands of HackersTrying to Break into An Organization, Launched by FireCompass New AI Technology Mimics Thousands of HackersTrying to Break into An Organization, Launched by FireCompass SaaS platform for Continuous Automated Red Teaming (CART) to proactively identify security blind spots before hackers do BOSTON – Oct. 14, 2020 – FireCompass today… Read More »Press Release: New AI Technology Mimics Thousands of Hackers

Top 10 Tools for Reconnaissance

Overview Reports show that more than 4.5 billion records were compromised in 2019. The figures were likely to increase in 2020. Hackers are using modern cyber tools to commit cybercrimes. There are some steps hackers take to hack a target, in which recon plays a key role.  It also plays a key role in penetration… Read More »Top 10 Tools for Reconnaissance

Benchmarking Deception Technologies

Benchmarking Deception Solutions

With the evolving threat landscape, breaches are becoming increasingly common. As per Ponemon Institute, in 2017, the average time required to detect a breach was 191 days and the average time required to contain a breach was 66 days. These time frames can have a significant impact on businesses relying on technology for their continued… Read More »Benchmarking Deception Solutions

FREE Deception Webinar

Webinar-Under The Hood Of Deception Technologies

What will you learn: How is deception technology different from honeypots ? Deception v/s EDR, UEBA and NTA A hacker’s view of deception across the kill-chain Key technology capabilities or key components of deception technology   About Speaker: Sahir Hidayatullah Cofounder, Smokescreen @sahirh     Sahir started his security career as an ethical hacker and… Read More »Webinar-Under The Hood Of Deception Technologies