Pay No Attention to the Man Behind the Curtain!

How do you detect a security breach inside your network? How do you collect the necessary intelligence to protect your assets properly? Sun Tzu, author of The Art of War, said that convincing your opponents to unveil their identity without knowing that they are being watched is one of the most important keys to winning a war. Attack deception is one of the best techniques to make attackers unveil their identity and gain valuable intelligence. While it is not new, advanced attack deception methods take advantage of Sun Tzu’s strategy.

Read more

Caught red handed – Alex

Opportunistic hackers are far from the limelight these days but they still exist and can cause large amounts of damage if they manage to break into your systems. We’ve recently observed our Data Center Security Suite catch such a hacker, an “Alex” from Romania who has kindly enough supplied his own name and private domain for publicity.

Read more

5 Key Takeaways from VMworld Barcelona

So, VMworld Europe just concluded last week and certainly there was a lot to talk about, from hybrid clouds, VMware’s acquisition of Boxer, Dell’s acquisition of EMC and how this affects VMware (it doesn’t according to Dell CEO Michael Dell), VMware CEO Pat Gelsinger’s keynote where he highlighted the five imperatives of the digital business and also called out of some enterprises for lack of agility (“Elephants must learn to dance”) and of course, security, which seemed to be integrated into almost every topic at the event.

Read more

Let’s talk at VMWorld 2015 SF!

We are very excited about the upcoming VMWorld Show and the opportunity to showcase our GuardiCore Data Center Security Suite.

The event brings together the greatest technology experts in virtualization and data centers, and it is a great opportunity for us to engage in a deep discussion with people who run Software-Defined Data Centers and hear first-hand about the security measures deployed across their data centers and clouds.

Read more

The Government Is Here To Help

Some of the most infamous cyber security breaches to US Federal systems in recent years were caused via a previous breach to a contractor’s system.  Some of the most notable cases were the Office of Personnel Management (OPM) breach where officials said that the thieves broke in by using stolen contractor logins and passwords and the Lockheed hack.

Read more

Gartner: Threat Deception Promises to Deliver Game-Changing Impact

Earlier this month, Gartner released a new research* focusing on threat deception technologies.

Gartner finds deception an attractive new capability for larger organizations desiring advanced threat detection and defense solutions. According to Gartner, new deception techniques and capabilities “promise to deliver game-changing impact on how threats are faced.”

For us at GuardiCore, this is not surprising. During the past months we have been working closely with our customers and witnessed how the GuardiCore solution is “changing the game” with automated, real-time threat detection and response inside datacenters and clouds. Read more

Data Center Ransomware

This is the first in a series of posts about ransomware, dealing with ransomware history, technological developments and GuardiCore forecast for future trends.

Ransomware is malware that infects your computer systems and restricts access to it, until a ransom is paid. Once your computer is infected, the malware hijacks your files, locks them up with virtually unbreakable encryption and demands a ransom of up to $2000 in Bitcoins to unscramble them. Read more