Cyber security teams in large enterprises are now understanding that they need an additional element of defense against:

a. Malware that continues to get smarter and more sophisticated
b. Gaps in security that stem from adoption of new IoT devices.

Let’s talk a little about advancement in malware strategies that hackers deploy against

By Michael Fabrico

Deception has become a strategic tool across many large organizations in the last 12 months. These organizations have had many tools in their security stacks, and have had to answer the question whether Deception should replace existing controls, complement or incorporate it into the existing security ecosystem.

The answer

By Ori Bach

DeceptionGrid now provides comprehensive support for both Amazon’s EC2 Cloud and the Kernel-based Virtual Machine (KVM) hypervisor used in large scale OpenStack Linux environments. DeceptionGrid support for the cloud enables customers to enjoy the full benefits of a Deception in Depth architecture to deceive, detect, and defeat attackers

By Moshe Ben-Simon , Co-Founder & VP Services and Trapx Labs

The Cisco Midyear Cybersecurity Report (MCR) has a ten year history, describing the increasingly sophisticated threats and techniques used by attackers in pursuit of their goals.  An unprecedented step for the most recent MCR from Cisco is the inclusion of

By Yuval Malachi , TrapX CTO

Business embrace the IoT revolution

The Internet of Things (IoT) is revolutionizing how enterprises do business with a market size estimated to reach $6.2 trillion by 2025. Adoption is especially rapid in industries like manufacturing (estimated share of 41%), healthcare (30.3%) and retail (8.3%).

Integrated IoT platforms