SmokescreenTech (@smokescreentech) 's Twitter Profile
SmokescreenTech

@smokescreentech

Smokescreen makes threat detection simple. Stop pulling teeth, start catching baddies. Deception-based active defense.

ID: 4198215313

linkhttp://www.smokescreen.io calendar_today11-11-2015 05:42:44

271 Tweet

454 Takipçi

177 Takip Edilen

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

We're super chuffed to announce this partnership with SDG Corporation . Our deception-based active defense solutions will be a key component of their cybersecurity, identity governance, and risk management services. issuewire.com/sdg-corporatio…

We're super chuffed to announce this partnership with <a href="/SDG_Corp/">SDG Corporation</a> . Our deception-based active defense solutions will be a key component of their cybersecurity, identity governance, and risk management services.
issuewire.com/sdg-corporatio…
SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Sahir Hidayatullah and the inimitable Steve King talk deception, active defense, offensive security, deep fakes, and AI-powered cyberattacks in the latest episode of CyberTheory's Cybersecurity Unplugged. cybertheory.io/moving-at-the-…

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Our partnerships grow stronger by the day. Very excited to announce this strategic relationship with Channel IT Ltd.. We'll now be delivering the next generation of deception-based active defense solutions to customers in Cyprus, Greece, and Malta. hubs.la/H0G4bpg0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Here's a blueprint for understanding how Sunburst-style supply chain attacks work and how you can thwart them with deception-based active defenses. hubs.la/H0G46PL0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Introducing our elite partner program that enables you to bring deception-based threat detection and active defense capabilities to a broader market. Interested? Hit us up on hubs.la/H0G4bpm0

Introducing our elite partner program that enables you to bring deception-based threat detection and active defense capabilities to a broader market. 

Interested? Hit us up on hubs.la/H0G4bpm0
SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Insurance companies are under siege from cyberattacks. We take a look at some of the key pieces of an insurer’s infrastructure that adversaries target and how you can use deception to build active defenses. hubs.la/H0G4fF50

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Active defense doesn't have to be a big project. Here's a step-by-step breakdown of four techniques from the MITRE Shield framework that you can implement today. hubs.la/H0G4gvn0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Bumping up one of the most popular attack and defense guides on our website. Download it if you haven't already. hubs.la/H0G4g-q0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

This was a super fun use case to see getting implemented. See how one of the world's largest banks used Smokescreen to build a private threat intelligence program ahead of launching a new business line. hubs.la/H0G4jWq0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Concerned about remote work security? Here's a blueprint of how attackers are laying siege to a perimeter-less world and recommendations on how you can thwart them with deception-based active defenses. hubs.la/H0G4ktL0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

When evaluating deception technology, look at three key components of the solution to ascertain how effective it will be in your environment – visibility, realism, and fingerprintability. hubs.la/H0G4mwr0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

Use this cheat sheet as a reference guide for deception techniques that can detect Sunburst at different stages of the attack. hubs.la/H0G4pzG0

Sudarshan (@sudartion) 's Twitter Profile Photo

I've been watching decoys I setup on the internet with the intention to share interesting stuff I see to my fellow infosec peeps here. Hopefully some weird stuff too. Here's stuff I see on SSH in the last 10 days

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

And we're back with another episode of Unfiltered. This time, we discuss Prof. Prashant Doshi's (University of Georgia) work on AI-based cyber defenses, attack phase identification, adversary intent recognition, and deception. Enjoy! youtu.be/wyqMUqGEGVY

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

✅ Why organizations suffer ransomware attacks despite being prepared ✅ The limits of a 'prevention' strategy and why you need Active Defense ✅ Case study - How an insurer used deception-based active defense to build a ransomware defense program hubs.la/H0NsmSM0

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

DarkSide didn't do anything radically different. Get a handle on how ransomware generally operates and you'll be in a better position to deal with it when it hits you. bit.ly/2Quue2n