Jan 2018

  1. Fidelis Blog: Using Network and Application Breadcrumbs for Intelligent Deception

    Using Network & Application Breadcrumbs For Intelligent Deception

    Tuesday, January 30, 2018
    Intelligent deception technology exploits the need of an attacker to discover as much as they can about where they are in the organization’s network immediately post compromise. This is a process not a single event. We have covered active directory and credential breadcrumbs, and file and data... READ MORE
  2. Using File and Data Breadcrumbs for Intelligent Deception

    Using File & Data Breadcrumbs For Intelligent Deception

    Monday, January 29, 2018
    Cyber attacks are not single events, they’re processes. When attackers first access a network or endpoint, they don’t know where they are. So they carefully try to find out as much as possible about the organization. This is precisely the behavior that intelligent deception technology can exploit... READ MORE
  3. 4 Kinds of Breadcrumbs In Intelligent Deception

    4 Kinds of Breadcrumbs In Intelligent Deception

    Friday, January 26, 2018
    Cyber attacks are processes that compromise, spread and exploit multiple systems across an organization. They’re not single events. When attackers compromise an asset, they don’t know which asset is infected; they must determine where they are in the network, the network structure and where they... READ MORE
  4. Intelligent Deception Creates Evidence Of Credential & Connection To Lure Attackers To Decoys

    Intelligent Deception Creates Evidence Of Credential & Connection To Lure Attackers To Decoys

    Tuesday, January 23, 2018
    To attract attackers, decoys are made to resemble the target systems as closely as possible. They have the look and feel of systems that an attacker seeks. Intelligent deception solutions actively lure attackers to the decoys once they have penetrated the perimeter. These lures, or breadcrumbs,... READ MORE
  5. Fidelis Report: Transformation Of Security Operations Is Top Of Mind for 2018

    New Research Report: Transformation Of Security Operations Is Top Of Mind for 2018

    Monday, January 22, 2018
    This report, conducted by SC Media and sponsored Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity... READ MORE
  6. Deception Technology

    Deception Security: Modern Maturity for Automated Detection and Response

    Thursday, January 11, 2018
    Deception is becoming a critical part of organisations' security infrastructure. According to Gartner, the need for better detection and response is creating new opportunities for security stack automation, integration, consolidation and orchestration, while also driving the emergence of new... READ MORE
  7. Fidelis Blog - SPECTRE & MELTDOWN: WHAT YOU NEED TO KNOW

    Spectre & Meltdown: What You Need to Know

    Friday, January 5, 2018
    Update: Fidelis has released a script for Fidelis Endpoint customers that allows users to quickly query their environment to check for the existence of the OS patches in addition to the hardware mitigations and optimizations in relation to Spectre/Meltdown.  This allows for quick reporting across... READ MORE
  8. The biggest data breaches of 2017

    2017 The Year Of The Breach

    Wednesday, January 3, 2018
    Cybercrime is a growing threat in today’s hyper-connected age. Breaches grew 15% between 2016 and 2017 (ITRC 2016, ITRC 2017). Meanwhile he average cost of a data breach blossomed to over $7 million according to a new Ponemon study and cybercrime damages are slated to cost the world $6 trillion by... READ MORE