Active Defense Through Deceptive Configuration Techniques

"Security architecture, based on deception strategies can effectively change the starting point of the legitimate network, providing additional time to prepare adequate defenses. Through configurable logical networking, a virtual network can be designed to monitor, capture, and lure malicious activity deeper into a virtual labyrinth, away from the real network. By incorporating the use of dynamic threat lists, offered by specific security tools, signatures can be created to strengthen the defenses of the internal network before the malicious actions reach the boundary. Using honeynet architecture, the virtual labyrinth can be dynamically and continually created providing protection from attackers. Through real-time knowledge gathering of the attacker’s exploitation techniques, the Labyrinth provides defenders with time to prepare effective countermeasures. In this paper, the demonstration on how the use of honeynet architecture can allow defense teams to strengthen their perimeter, by using customized dynamic threat lists created from a completely configured and monitored environment."

Spotlight

CyberGym

Make the world your training field. CyberGym® offers end-to-end, human-centered cybersecurity training and defense solutions, over WCWA (World Cyber Warfare Arena), a networked platform of legacy emulation arenas, knowledge share and qualification services. Our renowned offering serves governmental and private organizations around the world, with specifically tailored hands-on training programs and complementary services, backed by in-house elite security experts and hackers.

OTHER WHITEPAPERS
news image

Veritas Alta SaaS Protection

whitePaper | January 25, 2023

Veritas Alta™ SaaS Protection (formerly known as Netbackup SaaS Protection) is a cloud-based secondary storage platform for enterprise organizations to centrally protect, analyze, search, and manage all types of SaaS application data at any scale.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

Adobe Acrobat with Document Cloud Services Security Overview

whitePaper | October 26, 2022

At Adobe®, we know the security of your digital experiences is important. Security practices are deeply ingrained into our internal software development and operations processes and tools and are rigorously followed by our cross-functional teams to prevent, detect, and respond to incidents in an expedient manner.

Read More
news image

Protecting Against Sophisticated Bot Attacks

whitePaper | November 18, 2022

Bot-generated attacks have risen in visibility, and defending against these attacks is now a priority for most organizations. Yet challenges persist in accurately identifying bot traffic; protecting a distributed, heterogeneous application environment from these attacks; and minimizing the impact to legitimate users while doing so. To address these issues, intelligent protection against sophisticated bots is a necessity. This should include strong analytics coupled with human expertise, a frictionless user experience, and consistent coverage across different architectures and platforms. F5 Distributed Cloud Bot Defense, built on Google Cloud, supports these requirements and can help prevent fraud and abuse against public-facing web applications.

Read More

Spotlight

CyberGym

Make the world your training field. CyberGym® offers end-to-end, human-centered cybersecurity training and defense solutions, over WCWA (World Cyber Warfare Arena), a networked platform of legacy emulation arenas, knowledge share and qualification services. Our renowned offering serves governmental and private organizations around the world, with specifically tailored hands-on training programs and complementary services, backed by in-house elite security experts and hackers.

Events