Posted by: Kev Eley, Senior Director of Sales, EMEA – The proliferation of services into the online world continues at a staggering pace. Disruptive business models such as Uber and AirBnB exist only because of the connectivity afforded to individuals by the internet. We live so much of our lives online today it is hard […]
CTO Corner
Kaspersky Labs hacked – Deception technology could help
Posted by Yuval Malachi, Chief Technology Officer This week was a big week in cyber security. Kaspersky labs revealed the anatomy of the attack on their company via a vector called DUQU 2.0. Quite a sophisticated attack. I noted that on page 4 of their report (https://securelist.com/files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf) they described the initial attack, via email (could […]
Signature based cyber security strategies are failing at an increasing rate
Post by Yuval Malachi, TrapX Security CTO, Vice President and Co-Founder Current products supporting enterprise defense in depth strategies have proven to be increasingly vulnerable to some of today’s advanced persistent threats (APTs). The reasons are clear: the changing array of attack vectors and rapidly evolving new malware are by-passing or defeating attempts to identify […]
CTO Corner
Post by Yuval Malachi, TrapX Security CTO, Vice President and Co-Founder Get a head start on reverse engineering with deception technology. Reverse engineering to determine the full functionality of the binary is the ultimate form of static analysis — but there’s another way to approach it. A dynamic analysis can provide a valuable head start […]