The Role Privileged Identities Play in Successful Cyber Attacks
All ransomware attacks regardless of the attack vector involve the exploitation of privileged identity, and 1 in 5 endpoints and identities are vulnerable to exploitation. Listen to Brendan O’Connell, Chief Product Officer shares 3 imperative actions that security teams can take to protect their organization from identity risk. To learn more visit our Attack Surface Manager product page.
The Dramatic Growth of “Intentional” and “Sophisticated” Insider Threats
In this Become Illusive video, Wade Lance, Field CTO at Illusive, provides insights on why today’s insider threats have evolved to be more intentional and malicious, how they are more damaging to companies of all sizes, and the best offense to expose them.
Why Attackers Hate Illusive
We let a notorious ex-hacker, Alissa Knight, loose in our cyber range to knowingly go up against deception technology. Hear how the Illusive defenders Rick Tomlin and Nir Greenberg spotted her every move. Make sure you register to watch the live webinar event, The View from the Attacker to see all the dirty tactics she used and the frustration she experienced when going up against deception.
Active Defense: Changing the Game Against Attackers
Jeff Barker, VP of Product Marketing, joins Illusive to be part of a game-changing probabilistic and offensive approach to cyber security. Learn more about new and novel attributions used in recent attacks, a deconstruction of advanced threats, and why an Active Defense keeps attackers on their heels.
SolarWinds Nation-State APT Supply Chain Attack
Watch Matan Kubovsky, VP of Research and Development at Illusive give a quick overview of what the SolarWinds supply chain attack, the attack’s origin, how it gains access, its lateral movement moves laterally, what we believe will be their next move and a couple of recommendations to harden your security posture.
The Radical Evolution of Ransomware Attacks
Ofer Israeli, CEO and Founder at Illusive, provides a recap of points made during his recent panel discussion with CISOs and Cyber Security Executives who talked about the transformation of ransomware attacks, protecting an infrastructure that has drastically changed this last year and hopeful signs of an active defense with MITRE Shield. See the recap or watch the webinar in its entirety by visiting, CISO Roundtable On-Demand Webinar
Insights from a Former NSA Director on How Attackers View Lateral Movement
Mike Rogers, Senior Advisor at Team8, and former NSA Director and retired Admiral of the US Navy focused on cyber intelligence and defense of government network systems discusses the importance of understanding the attacker’s point of view, why it is essential to detect attackers that penetrate, but more importantly how they move laterally.
Partnering with Microsoft to Protect the Cloud
Nicole Bucala, VP of Business Development at Illusive provides insights on our added value to Azure customers with attack surface reduction, deterministic attack detection capabilities, and incident forensics to Azure Active Directory, Azure Sentinel, and Microsoft 365 E5 customers.
How to Stop Advanced Ransomware Threats
Watch our short (2 min) video where Wade Lance, Field CTO at Illusive addresses the latest Advanced Ransomware Threats (ART), breaks down how they mimic the behavior of Advanced Persistent Threats (APT), and provides details of a deterministic approach based on deception that can detect lateral movement and can deny attackers access to your most critical assets.