1. Using Deception to gain IOT security awareness

    Using Deception to Gain Enterprise IoT Attack Visibility

    Doron Kolton |

    The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and make sure devices have enough memory for firmware and kernel updates to remove vulnerabilities or service backdoors, plus … READ MORE

  2. Fidelis Blog: Five myths of deception defenses

    5 Myths of Deception Defenses

    Deception has been used for centuries to divert attacker attention and protect vital assets. In the Art of War, Sun Tzu said: “All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must ma … READ MORE

  3. Fidelis Blog: Man Vs Machine Using Deception Defenses

    Man vs Machine Using Deception Defenses

    Doron Kolton |

    Originally published in Information Magazine on March 26, 2018. Machine automation provides leverage to attackers to scale out attacks beyond human capacity. However, machine analysis has its limits on the types of data it can assess compared to human capabilities. Recently Fidelis Cybersecurity … READ MORE

  4. Fidelis blog: A SOC under siege: alert fatigue

    A SOC Under Siege: How to Reduce Alert Fatigue

    Sam Erdheim |

    I recently sat down with a SOC analyst from a large e-commerce vendor who showed me his daily workflow. He walked through how he had different data sources pumping into his SIEM, which spit out lots of alerts. Then he walked through a few examples, starting with the alert from the SIEM and then … READ MORE

  5. Five Key Components of Active Cyber Defense

    5 Key Components of an Active Cyber Deception Defense

    Doron Kolton |

    The goal of cyber deception is to more effectively detect attacks that have infiltrated an organization’s network, to confuse and misdirect the attacker, and to understand what assets have been compromised. Remember, deception defenses can leverage the attackers’ knowledge gap while they try … READ MORE

  6. Fidelis SOC under siege

    A SOC Under Siege: Alert Overload and Cyber Skills Shortage

    Sam Erdheim |

    A SOC Under Siege: Alert Overload and Cyber Skills Shortage One of the key issues in cybersecurity today is the skills shortage – there simply are not enough cybersecurity professionals to go around in the everyday battle against cybercriminals, nation-states and hacktivists. According to the … READ MORE

  7. Most Popular Decoys and Breadcrumbs for Deception Defense

    Popular Decoys and Breadcrumbs for Deception Defense

    Doron Kolton |

    As we saw in ourprevious blogpost, creating a knowledge gap for your attackers allows you to divert them and slow them down in their quest for information. At the same time, knowing what attackers desire creates the opportunity for an active, intelligent defense to lure, detect, and defend. This … READ MORE

  8. The knowledge Gap

    Knowledge Gap Impact with Deception Defenses

    Doron Kolton |

    Capture the flag exercises show how quickly attackers can learn a new network environment to reduce their noise levels and evade detection. This puts pressure on detection defenses in the first few hours or days when attackers are likely to be noisier. This concept is known as the ‘knowledge ga … READ MORE

  9. DNS plumbing leak

    Is Your Network's DNS Plumbing Leaky?

    Introduction: As detection mechanisms grow more sophisticated, malware developers try new methods to evade. Recently, there has been a growing trend to exfiltrate data and issue commands to malware via the DNS protocol. DNS Command & Control and DNS exfiltration can be successful because DNS is … READ MORE