Blog
-
Deception / 10.13.2021
Defending crown jewel assets such as Active Directory Domain Controllers from Breaches
Active Directory domain controllers are among the most common critical assets in organizations and are considered also by Cybercriminals to be the crown jewels of the organization.
Continue reading -
Deception / 09.15.2021
Defending Against Cisco Authentication Bypass Vulnerability Exploits
TrapX DeceptionGrid deceives and traps attackers exploiting Cisco vulnerabilities, including the latest critical Vulnerability in Cisco NFV Infrastructure Software (NFVIS).
Continue reading -
Deception / 09.01.2021
Staying Strong Despite Vulnerabilities
No system is 100% foolproof – all systems have weaknesses: humans get sick, cars break down and elevators get stuck. Sometimes these weaknesses can be fixed quickly; other times, a fix might take considerable time or may not be feasible.
Continue reading -
Deception / 08.25.2021
TrapX DeceptionGrid Deceives and Traps Attackers Exploiting Latest Vulnerabilities
Attackers who attempt to exploit latest Windows vulnerabilities PrintNightmare and HiveNightmare (SeriousSAM) are deceived and detected by TrapX DeceptionGrid.
Continue reading -
Deception / 08.18.2021
Securing Containers: The NSA perspective
NSA publishes recommendations for hardening Kubernetes.
Continue reading -
Deception / 08.11.2021
Protecting Operational Technology Environments from Today’s Cyberthreats
DeceptionGrid from TrapX can help manufacturers and industrial producers strengthen the security of their plants and avoid costly production interruptions by cybercriminals.
Continue reading -
Deception / 08.04.2021
TrapX to protect Japanese businesses against Ransomware
The Nikkei reports a new service powered by TrapX
Continue reading -
Risk / 07.27.2021
Myth vs Fact – Securing Containerized Environments
As organizations adopt containers in search of agility and scalability, is this technology truly inherently secure or is this a harmful myth?
Continue reading -
Deception / 07.21.2021
How TrapX Can Help You Defend Against RMM Supply Chain Attacks Like Kaseya
The recent REvil attack that exploited Kaseya is yet another reminder of the disruptive power of ransomware. Learn how TrapX can help defend against debilitating supply chain attacks.
Continue reading -
Deception / 07.14.2021
RAFAEL includes TrapX in its Operational Technologies Cyber Consortium
TrapX collaborates with Iron-Dome developer to defend against cyber warfare activities by state actors as well as by independent rogue hackers to protect critical assets.
Continue reading -
Deception / 07.07.2021
Unburied Treasure
Emulation has emerged from the honeypot hype to power modern deception technology
Continue reading -
Ransomware / 06.30.2021
Why ransomware is a national security crisis – and what to do about it
To win against ransomware, use CryptoTrap from TrapX to deliver a deceptive network share to attackers. By letting them think they have successfully encrypted and stolen valuable data, you gain precious time to remediate the risk and launch automatic or manual threat source isolation.
Continue reading -
Deception / 03.16.2021
Good for nothing breach: Lowering exposure by making stolen data harder to monetize
International travel in a holding pattern but travel industry hacks are in full steam. Before 2020 much of my life…
Continue reading -
Deception / 03.10.2021
More is Less: Why conventional security alone can’t match today’s threat landscape
There’s a locked steel door at the end of a hallway. Employees swipe their badges to get in. A sign…
Continue reading -
Risk / 12.23.2020
Lessons from the solarwinds breach: there is nothing new under the sun?
In light of recent events, security leaders must accelerate adoption of active defense and adversary engagement strategies to proactively mitigate risk. A…
Continue reading -
Deception / 12.11.2020
An early holiday gift: a tale of butter, cyber deception and the wall street journal
If there was a global holiday wish list for marketing leaders, a Wall Street Journal feature story would surely be…
Continue reading -
Deception / 08.19.2020
One giant step for deception
Last week, MITRE released MITRE Shield, an active defense knowledgebase that captures and organizes what they’re learning about active defense adversaries….
Continue reading -
Deception / 07.15.2020
Remote work is here to stay: is your security team prepared?
Many organizations around the world have asked their employees to work from home in response to the COVID-19 pandemic. While this…
Continue reading -
TrapX News / 04.06.2020
TrapX security is here during the covid-19 crisis: a personal message from TrapX security CEO Ori Bach
As I write this, significant roadwork is happening across the street. This particular project was originally scheduled to begin months…
Continue reading -
Deception / 03.28.2020
Security teams must prepare their organization to attackers taking advantage of coronavirus
The new coronavirus strain (COVID-19) that emerged in China represents a business disruption and means turmoil for employees and work….
Continue reading -
Deception / 07.10.2019
Key takeaways from Gartner on deception technology-IoT security
Driven by customer demand, Gartner continues to increase coverage of the growing deception technology space, which they have dubbed “Distributed…
Continue reading -
Deception / 06.26.2019
Key takeaways from gartner on deception technology
Driven by customer demand, Gartner continues to increase coverage of the growing deception technology space, which they have dubbed “Distributed…
Continue reading -
Deception / 03.31.2019
Cyberattacks on aircraft – a rising trend for cyber crime
Are We In Danger? There is a rising concern today in aviation security. The potential for cyberattacks on aircraft, something that might…
Continue reading -
Deception / 08.26.2018
Are endpoint security solutions enough?
Data breaches are a very common occurrence in today’s world. Criminal organizations are making millions of dollars on stolen business…
Continue reading -
Deception / 08.14.2018
As cyber-deception becomes more prevalent, regulators are taking notice
At its early stages, deception technology adoption was driven by forward-thinking security teams looking to get ahead of cyber attackers….
Continue reading -
Risk / 07.10.2018
Data breaches via RDP reach and all new high
No business owner goes to work thinking “I’m going to get hacked today” despite seeing multiple data breaches happening to…
Continue reading -
Deception / 06.19.2018
The need for next generation honeypots
As cyber threats continue to evolve and become more elaborate, organizations are struggling to find ways to protect their informational…
Continue reading -
Deception / 06.12.2018
Why deception is a must have in cybersecurity
“Although to use deception in any action is detestable, nevertheless in waging war it is praiseworthy and brings fame: He…
Continue reading -
Deception / 03.11.2018
Could the next data breach (like equifax’s) be prevented?
Let’s face it, most enterprises are already in the cloud. On-premise Data centers are lovely, but the cloud gives enterprises…
Continue reading -
Deception / 02.21.2018
Hackers are putting the pedal to the metal with new and advanced technique
Cyber security teams in large enterprises are now understanding that they need an additional element of defense against: a. Malware…
Continue reading
Learn more about our unique approach to Deception
Discover why more than 300 global customers call TrapX "simple, powerful, and affordable."