Illusive Networks, a cybersecurity startup based out of Israel that protects networks by building "deception" frameworks to identify and trap malicious hackers, is today announcing that it has added Microsoft Ventures - the software giant's young investment arm - as its newest strategic investor.
Topic: Cyber Deception
Cyber deception is a deliberate and controlled act to conceal networks, create uncertainty and confusion against the adversary's efforts to establish situational awareness, and to influence and misdirect adversary perceptions and decision processes. The best known attempts at cyber deception in the commercial realm are honeypots and honeynets.
Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must fight through adversary action in complex tactical and strategic environments. Just now completing its third year, the Cyber-Security Collaborative Research Alliance has sought to develop approaches for
The Department of Defense currently depends upon static cyber defense systems. Adversaries can plan their attacks carefully over time by relying on the static nature of our networks, and launch their attacks at the times and places of their choosing. The DoD needs new tools and technologies to reverse the current asymmetry that favors our cyber adversaries,
As organizations migrate critical services to the cloud, adversaries gain increasing incentive to gain access to these environments. Attacks against cloud environments can range from traditional exploits against an instance to complex, low-level attacks against the underlying infrastructure. This webinar will provide an overview of cloud attacks, drawing