Blog
-
Deception / 09.15.2021
Defending Against Cisco Authentication Bypass Vulnerability Exploits
TrapX DeceptionGrid deceives and traps attackers exploiting Cisco vulnerabilities, including the latest critical Vulnerability in Cisco NFV Infrastructure Software (NFVIS).
Continue reading -
Deception / 09.01.2021
Staying Strong Despite Vulnerabilities
No system is 100% foolproof – all systems have weaknesses: humans get sick, cars break down and elevators get stuck. Sometimes these weaknesses can be fixed quickly; other times, a fix might take considerable time or may not be feasible.
Continue reading -
Deception / 08.25.2021
TrapX DeceptionGrid Deceives and Traps Attackers Exploiting Latest Vulnerabilities
Attackers who attempt to exploit latest Windows vulnerabilities PrintNightmare and HiveNightmare (SeriousSAM) are deceived and detected by TrapX DeceptionGrid.
Continue reading -
Deception / 08.18.2021
Securing Containers: The NSA perspective
NSA publishes recommendations for hardening Kubernetes.
Continue reading -
Deception / 08.11.2021
Protecting Operational Technology Environments from Today’s Cyberthreats
DeceptionGrid from TrapX can help manufacturers and industrial producers strengthen the security of their plants and avoid costly production interruptions by cybercriminals.
Continue reading -
Risk / 07.27.2021
Myth vs Fact – Securing Containerized Environments
As organizations adopt containers in search of agility and scalability, is this technology truly inherently secure or is this a harmful myth?
Continue reading -
Deception / 03.16.2021
Good for nothing breach: Lowering exposure by making stolen data harder to monetize
International travel in a holding pattern but travel industry hacks are in full steam. Before 2020 much of my life…
Continue reading -
Deception / 03.10.2021
More is Less: Why conventional security alone can’t match today’s threat landscape
There’s a locked steel door at the end of a hallway. Employees swipe their badges to get in. A sign…
Continue reading -
Risk / 12.23.2020
Lessons from the solarwinds breach: there is nothing new under the sun?
In light of recent events, security leaders must accelerate adoption of active defense and adversary engagement strategies to proactively mitigate risk. A…
Continue reading -
Deception / 08.19.2020
One giant step for deception
Last week, MITRE released MITRE Shield, an active defense knowledgebase that captures and organizes what they’re learning about active defense adversaries….
Continue reading -
Deception / 07.15.2020
Remote work is here to stay: is your security team prepared?
Many organizations around the world have asked their employees to work from home in response to the COVID-19 pandemic. While this…
Continue reading -
Deception / 07.10.2019
Key takeaways from Gartner on deception technology-IoT security
Driven by customer demand, Gartner continues to increase coverage of the growing deception technology space, which they have dubbed “Distributed…
Continue reading -
Deception / 03.31.2019
Cyberattacks on aircraft – a rising trend for cyber crime
Are We In Danger? There is a rising concern today in aviation security. The potential for cyberattacks on aircraft, something that might…
Continue reading -
Deception / 08.14.2018
As cyber-deception becomes more prevalent, regulators are taking notice
At its early stages, deception technology adoption was driven by forward-thinking security teams looking to get ahead of cyber attackers….
Continue reading -
Risk / 07.10.2018
Data breaches via RDP reach and all new high
No business owner goes to work thinking “I’m going to get hacked today” despite seeing multiple data breaches happening to…
Continue reading -
Deception / 02.21.2018
Hackers are putting the pedal to the metal with new and advanced technique
Cyber security teams in large enterprises are now understanding that they need an additional element of defense against: a. Malware…
Continue reading
Learn more about our unique approach to Deception
Discover why more than 300 global customers call TrapX "simple, powerful, and affordable."