Blog

  • Beyond Identity: The End of Authentication Frustration

    Password incorrect.Additional verification required.Enter code to sign in.Account will be locked after one more failed attempt. We’ve all experienced the speed bumps and roadblocks that result from attempts to keep online accounts secure. Average users have a total of 90 online accounts—which means 90 passwords to keep track of, plus the added friction associated with 2FA (two-factor authentication) and MFA (multi factor authentication). It is a lot to manage, and when accounts are difficult…

  • Deciphering the Current Wave of Cybersecurity Venture Capital

    The current wave of venture investing in cybersecurity took off in 2012, catalyzed by three major IPOs: Proofpoint, Splunk and Palo Alto Networks. As is typical, big exits in a space significantly increase investor confidence and drive up supply of capital as additional investors rush in hoping to find the “next big thing.” 2013 saw another major exit with the “eye-popping” IPO of FireEye. It also became the year that cybersecurity rocketed to the forefront of public attention — first after…

    • April 21, 2016

    Forter: The new force behind retail and ecommerce security

    A decade ago, when we heard the term “retail security” it was likely to evoke images of mall security guards patrolling local shopping centers. But now, it’s 2016 and things have changed. According to the U.S. Department of Commerce, ecommerce sales were $341.7B last year (up 14.6% ), with ecommerce as a percent of overall retail sales also continuing a steady climb. With the shift in the way people spend, comes the demand to evolve protection of companies and consumers. The Fraud Problem…

  • illusive networks: Why Honeypots are Stuck in the Past

    “All warfare is based on deception” – Sun Tzu Whether “Trojans” or “Phishing”, deception has long been a valuable technique used by hackers to gain unauthorized access to corporate networks. Yet, the use of deception for the purpose of defending against these hackers has remained limited. Defensive deception has traditionally taken the form of “Honeypots”, in which fake systems containing resources seemingly lucrative to attackers are deployed on a corporate network. More recently, virtual…