Microsoft creates fake Azure tenants to pull phishers into honeypots
Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercriminals…
Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercriminals…
Security is a top priority for all customers on Google Cloud, whether beginner, intermediate, or...
By Raj Gopalakrishna, Co-Founder and Chief Product Architect, Acalvio Technologies The use of stolen credentials and resulting identity compromises have…
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity…
By Brett James, Director, Transformation Strategy at Zscaler In recent years, federal agencies have expanded remote work dramatically, and in…
While there's plenty of upside to rolling out deception technologies, it's not clear if cybersecurity leaders — or their organizations…
Organizations must be prepared to root out bad actors by any means possible, even if it means setting traps and…
By David Barroso, Founder & CEO, CounterCraft Whether it’s the purported 36% of employees that can still access […] The…
Record-setting ransomware attacks, a shortage of skilled personnel, and low security awareness across the workforce cause headaches for IT security…
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.