Getting Proactive About User & System Management
Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...
Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...
Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors...
Active Deception Through Cyber Maneuver The concept of dynamic identity can play a significant role in deception and adaptive defenses. Static mappings of identities create vulnerabilities that undermine protections and...
Cloud Computing – A Potpourri of Adaptive Defenses Cloud adoption is gaining momentum by leaps and bounds. How can you argue with the ubiquity and elasticity that cloud computing offers?...
Active cyber defense offers deception, delay and persistent detection approaches to disrupt cyber attacks while also increasing the work factor for the attacker. By camouflaging defenses, deception can provide real-time...
Living in a Hostile Cyber World “These are the times that try men’s souls…” – Thomas Paine You are the product manager for a new offering and you just clicked...
Ramping up Your Security Operations Center You just found out that your network is permeated with malware, and has been for months. What do you do now? You can’t just...
Choose Your Deception Active Cyber Defense can enable a large variety of specific deception tactics that can delay, confuse, scare away, or tie up an attacker depending on the circumstances...
Being Active For Your Cyber Health We all know that having an active lifestyle can promote good health in our physical world. The same is true for the cyber defense...