November 06, 2019

The Power of Intelligence-Driven Deception Networks

Enterprises battling cyber threats to their own organization and their third parties continuously invest in approaches that may give them the advantage over their adversaries. This blog highlights how deception-based network defense is one such approach gaining interest. Let’s start by defining what deception is. Deception is an act or statement which misleads, hides the […]

Read more >
September 11, 2019

Protecting Organizations with Integrated Client + Network Cybersecurity

Today’s security defenders are tasked with the challenge of detecting – and mitigating – cybersecurity threats, no matter the origin (cloud, Internet, insider, email…etc). However, depending on the nature and sophistication of the threat, there is no single point in an organization’s security infrastructure that can see all aspects of the threat – whether coming […]

Read more >
December 05, 2018

Tips to Big Data Use in Cybersecurity Operations

The term Big Data is often misused or used to represent many different concepts depending on who is delivering the message or what context that data is being used for. In its simplest definition, Big Data refers to data sets that are too large for traditional data processing techniques to manage or manipulate. Within cybersecurity, the term is often […]

Read more >