Apr 2018

  1. Fidelis Deception now in the cloud

    Fidelis Extends Elevate Platform to Protect Cloud Assets with Active Deception

    Wednesday, April 18, 2018
    Cloud access credentials for AWS cloud accounts hardcoded and placed within containers make it all too easy for hackers to gain entry. We’ve all seen it in the news - businesses are falling victim to their AWS cloud assets being used to mine crypto currency. The benefit of cloud is agility, however... READ MORE
  2. Using Deception to gain IOT security awareness

    Using Deception to Gain Enterprise IoT Attack Visibility

    Friday, April 13, 2018
    The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and make sure devices have enough memory for firmware and kernel updates to remove vulnerabilities or service backdoors, plus... READ MORE
  3. Fidelis Blog: Five myths of deception defenses

    5 Myths of Deception Defenses

    Monday, April 9, 2018
    Deception has been used for centuries to divert attacker attention and protect vital assets. In the Art of War, Sun Tzu said: “All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make... READ MORE
  4. Fidelis Blog: Man Vs Machine Using Deception Defenses

    Man vs Machine Using Deception Defenses

    Monday, April 2, 2018
    Originally published in Information Magazine on March 26, 2018. Machine automation provides leverage to attackers to scale out attacks beyond human capacity. However, machine analysis has its limits on the types of data it can assess compared to human capabilities.  Recently Fidelis Cybersecurity... READ MORE