Managed Security Services (MSS): Comprehensive Guide

Data security has developed significantly for the last few years. Businesses now need to implement security services to prevent themselves from cybersecurity attacks, leakages, and frauds.

As an example, Marriott has suffered a massive data breach that affected up to 500 million customers in 2018. The breach included payment information, mailing addresses, phone numbers, and passport numbers. The further investigation discovered that a disguised Remote Access Trojan (RAT) allowed hackers to gain control over the IT system. Read more

Share

Security Analytics in Age of AI: In-depth Guide [2019 update]

Every day 2.5 quintillion bytes of data are produced. Some of it is important (and private), like the most essential of financial and medical records. Some of it, like the cleaning path taken by an IoT vacuum is largely useless (or is it?). And all of it can become vulnerable without the right security effort.

Subsequently, there is a growing need for us to find new and better ways to protect our most sensitive data from a host of digital threats rise. Cybersecurity analytics can ultimately help to lay the foundation for large scale data protection.  Some questions that this post sets out to answer include:

What is cybersecurity analytics?

What are the benefits of cybersecurity analytics?

What are some common cybersecurity use cases?

How do AI and cybersecurity analytics go together?

What are some best practices for cybersecurity analytics?

What are some pitfalls/challenges in cybersecurity analytics?

What are tools to aid in effective cybersecurity analytics?

How can I start to establish a cybersecurity analytics program in my organization?

What is Cybersecurity Analytics?

Every day millions of cyber attacks are successfully executed around the world. Though it may be impossible to 100% prevent them all, we can certainly learn from them to help develop better ways to stay protected. Cybersecurity analytics studies the digital trail left behind by cyber criminals to help better understand weaknesses and how to prevent similar losses in the future.

Share

Deception Technology: in-Depth Guide [2019 update]

Though simple deception techniques such as honeypots have been around since 2000s, new deception technology techniques make deception technologies an emerging area to invest in for additional security measures.

What is deception technology?

Traditional network security consists of a limited number of responses which include logging, rejecting, quarantining intrusions. While these responses can block individual attacks, actions such as rejecting are visible to the adversary. Skilled adversaries can learn from these responses, increase the sophistication of their attack and test their target’s defenses. Instead, when dealing with intruders, companies can also rely on their attacker’s greatest weapon: deception. Read more

Share

Top 20 Deception Technology Companies [2019 update]

Deception technology is a growing part of modern intrusion detection systems. See our article on deception technology to learn more. Read on to understand deception technology ecosystem and a comprehensive list of vendors.

Deception Technology Ecosystem

Incumbent security software providers

Companies like Symantec provide end-to-end cybersecurity solutions including solutions that include deception technology

Startups

Numerous startups have been launched since 2010s focusing on deception security.

Complete List of Deception Technology Vendors

* Date when tool was launched not the day the company was launched. This is because Symantec’s founding date is irrelevant when discussing their tool which provides features of deception technology.

** Only relevant for startups that focus on a single product because Symantec’s number of employees is irrelevant when discussing their specific deception security tool.

This is possibly an incomplete list in an emerging field, feel free to suggest other vendors in comments. And if you need to find the right AI vendors for information security:

Share