Read our latest research and updates on the seedata.io platform in our blog
Microsoft’s Azure Honeypots – A Promising Step Forward
Microsoft is spawning realistic-looking honeypot tenants to collect intelligence about cybercriminals. At Seedata.io, we think this is a great initiative, and hope it paves the way for wider adoption
Buy Versus Build
At Seedata.io, we’ve worked hard to develop a solution that delivers high impact with minimal fuss. But we also recognise that every organisation is different. If you’re on the fence, we’d be happy to talk through your specific needs
Why Your Cloud Estate Needs Deception Technology
By leveraging deception technology, you can regain control of your cloud environment, reduce false positives, and focus on what matters most—real threats.
Armura Partnership Announcement
Italy’s cybersecurity market is currently valued at €2.16 billion, a 16% increase from 2022 and showing demand for innovative cybersecurity solutions to protect sensitive data and infrastructure.
Myth Busting On Deception Technology
We’ve spoken to a lot of people about deception technology and its place in their cybersecurity strategy. Some already have it, some are considering it, but many are reluctant, for a mixture of reasons. Here, we tackle some of those reasons and present our counterpoints to the more common objections.
Deception Technology as a budget hack
If you’re constantly faced with the challenge of balancing an effective cybersecurity strategy against the constraints of your budget, maybe it’s time to consider deception technology, to significantly enhance your security posture, save costs and reduce the burden on other security measures.
The Power of Cyber Deception for MSSPs
MSSPs must differentiate their offerings to stand out from the competition. By incorporating seedata.io into their security portfolios, MSSPs can position themselves as trusted advisors and strategic partners, rather than just service providers
RSAC-2024
Going to RSA 2024? We’ll be there (and at B-Sides SF too), and would love to catch up with old and new friends
Small Business Discounts
We’re offering special discount prices to small businesses, to help improve their cybersecurity.
Using deception to augment your existing tools
Don’t (just) think of deception as a standalone strategy. Think of it as a way of getting better results from your existing security investments
Bring your friends, earn free credits
Show your contacts what they’re missing and we’ll thank you with free credits for each new signup
What seeds should I deploy, and where?
When setting out your deception campaigns, it vital to consider your adversary’s techniques, your own network topology, and the goals of your campaign. Use MITRE ENGAGE within our process here to help you define your strategy
Unleashing the power of deceptive techniques in cloud threat detection and response
In this blog post, we’ll explore the value of incorporating deceptive techniques within a CDR framework and delve into the world of detection engineering
Return On Investment
Security teams are always asked to prioritise solution with a clear ROI. so, we’re sharing this post to help you understand the value of deploying Seedata.io.
9 principles for practitioner-focused cybersecurity software
Our good friend Ross Haleliuk from Ventures in Security has just released an article on 9 principles for security software. Naturally, we got curious. So, during our flight back from BSides and RSA, we seized the opportunity to consider our own performance
The Evolution of Deception Technology
Cybercriminals regularly use deceptive techniques as part of their campaigns because it’s effective, quick, and inexpensive
What is deception technology
Deception technology enables detection without compromising real data by using decoys or traps to trick cyber criminals into stealing fake data