First thing first, let us group all these ominous words such as “Darknet”, “Darkweb”, or other similar analogies behind a much more sensible one, the DeepWeb. Then, let’s take a dive together into it to define what it is exactly and what information it contains.
A shift in working patterns implies a changed information risk landscape
We’re all human: we make mistakes. Unfortunately, there will always be people trying to take advantage of our mistakes for their own benefit, which can cost our business tremendous financial loss. No matter how sophisticated our cyberdefenses are, how advanced our technologies are, how good our security practices are, we will always be constrained by this human factor.
In this newsletter, we’ll cope with the Pushing Left approach. What is this approach? Why do we need it?
In the first episode, we have seen what is deception technology. Let’s discover how to get started.
The term Deception technology might be unknown or obscure to you, and that is perfectly normal considering it refers to one of the latest trend in the cybersecurity field. Its concepts are however quite intuitive and easy to understand, and based on other well-known technologies such as Honeypots.