Gartner Blog Network

Tag: 'deception' Blog Posts

from the Gartner Blog Network

Speaking at Gartner Security and Risk Mgmt Summit 2017

by Augusto Barros  |  April 18, 2017

Another year, another Gartner Security and Risk Management Summit! The event will be in DC, between June 12 and 15th. I'll be presenting two sessions this year: Endpoint Detection and...

Read more »

Deception Technologies - The Paper

by Augusto Barros  |  November 18, 2016

After some very fun research, we're finally publishing our paper on deception technologies: Applying Deception Technologies and Techniques to Improve Threat Detection and Response 18 November 2016 | ID: G00314562...

Read more »

Deception as a Feature

by Augusto Barros  |  September 30, 2016

One of the things we are also covering as part of our research on deception technologies is the inclusion of deception techniques as features in other security products. There are...

Read more »

Deception related technology - its not just a "nice to have", its a new strategy of defense

by Lawrence Pingree  |  September 28, 2016

Deception Techniques "Can be", and "Are" being used in other Security Solutions In my earlier Emerging Technology note on deception (see "Emerging Technology Analysis: Deception Techniques and Technologies Create Security...

Read more »

Building a Business Case for Deception

by Augusto Barros  |  September 27, 2016

So we've been working on our deception technologies research (have we mentioned we want to hear YOUR story about how YOU are using those?) and one of the things we...

Read more »

New Research: Deception Technologies!

by Augusto Barros  |  September 13, 2016

With the work on our upcoming SOC paper and on the TI paper refresh winding down, we are preparing to start some exciting research in our new project: Deception Technologies!...

Read more »

Yes, Give Deception a Chance!

by Augusto Barros  |  January 14, 2016

So, Anton finally brought the deception subject up on his blog, leaving a small bait for me at the end of his post. Ok, that's a great subject to return...

Read more »

Deception cont'd: How to defend yourself against semantic attacks?

by Joerg Fritsch  |  February 11, 2014

A large number of attacks need successful spear phishing as necessary precursor. To me spear phishing falls into the larger group of "semantic attacks". For example, semantic attacks can deceive...

Read more »

"Now you don't" --deception in the hacktivists' arsenal

by Joerg Fritsch  |  January 18, 2014

Recently I watched the movie "Now You See Me". -- For the ones that don't know this movie, it is about four stage illusionists who pull off tricks at an...

Read more »