{"id":234,"date":"2020-10-12T10:37:29","date_gmt":"2020-10-12T10:37:29","guid":{"rendered":"http:\/\/cybernetics.partners\/?p=234"},"modified":"2020-10-12T10:43:20","modified_gmt":"2020-10-12T10:43:20","slug":"challenging-cyber-deception-with-ray-kafity","status":"publish","type":"post","link":"https:\/\/cybernetics.partners\/?p=234","title":{"rendered":"Challenging Cyber Deception, with Ray Kafity"},"content":{"rendered":"\n<figure class=\"wp-block-embed-vimeo wp-block-embed is-type-video is-provider-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Challenging Cyber Deception - with Ray Kafity\" src=\"https:\/\/player.vimeo.com\/video\/467293581?dnt=1&amp;app_id=122963\" width=\"640\" height=\"360\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\"><\/iframe>\n<\/div><figcaption>Please share your comments and reactions at the <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6721346984998920192\" target=\"_blank\" rel=\"noreferrer noopener\">Cybernetics Partners Linkedin Post<\/a><\/figcaption><\/figure>\n\n\n\n<p>Things have changed, the perimeter has vanished, and protection layers alone are not enough. Insider threats are on the rise, and organizations must build their defenses based on the assumption that a malicious hacker is already inside their network. Adding detection technologies will prove to be critical, and one method of insider threats detection is Cyber Deception.<\/p>\n\n\n\n<p>Cyber Deception is built around luring insiders with deceptive assets in order to derail their activities during the attack phases.<\/p>\n\n\n\n<p>But is Cyber Deception another point solution that adds to the alert fatigue and overlaps with other detection and response ones?<\/p>\n\n\n\n<ul class=\"wp-block-social-links alignright is-layout-flex wp-block-social-links-is-layout-flex\">\n\n\n\n\n\n\n\n\n\n<li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/cybernetics-partners\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Things have changed, the perimeter has vanished, and protection layers alone are not enough. Insider threats are on the rise, and organizations must build their defenses based on the assumption that a malicious hacker is already inside their network. Adding detection technologies will prove to be critical, and one method of insider threats detection is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":235,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[31,15,33],"class_list":["post-234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video","tag-cyberdeception","tag-cybersecurity","tag-detection-and-response"],"_links":{"self":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=234"}],"version-history":[{"count":2,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/234\/revisions"}],"predecessor-version":[{"id":238,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/234\/revisions\/238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/media\/235"}],"wp:attachment":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}