I’ve been pondering the use of deception and variability to defend IT assets. Honeypots have been discussed in this context for quite a while, yet their initial implementation failed to take off . . .
Six weeks ago both Palo Alto Networks and CrowdStrike released reports regarding a highly advanced attack on US governmental and political targets. The group behind the attack, dubbed APT28, . . .
Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.