I’ve been pondering the use of deception and variability to defend IT assets. Honeypots have been discussed in this context for quite a while, yet their initial implementation failed to take off . . .
The Attack on the DNC - How APT's can be prevented
July 28, 2016
|
Gal Bitensky
Six weeks ago both Palo Alto Networks and CrowdStrike released reports regarding a highly advanced attack on US governmental and political targets. The group behind the attack, dubbed APT28, . . .
Read More >>