Steve Preston of TrapX Security: 5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity

An Interview With Jason Remillard

Jason Remillard
Nov 6, 2020 · 15 min read

Deception is an ancient tactic. It is a staple for attackers but largely ignored by defenders. It’s time for security to practice deception of their own. All laptops, applications, routers, printers, sensors, controllers, files, credentials and links don’t have to be real. They can be fake. We can fill our network with misinformation and traps. We can turn the tables on attackers, so they must be right 100% of the time and defenders only have to be right once. That means that we have to be more creative, business aligned, risk oriented and active. Take another look at FAIR, MITRE ATT&CK and MITRE Shield and consider a holistic approach that includes Deception.

Authority Magazine

In-depth Interviews with Authorities in Pop Culture, Business, Tech, Wellness, & Social Impact

Authority Magazine

In-depth Interviews with Authorities in Business, Pop Culture, Wellness, Social Impact, and Tech. We use interviews to draw out stories that are both empowering and actionable.

Jason Remillard

Written by

Leading the charge in bringing data privacy as affordable, deployable and realistic solutions that every business owner can take advantage of

Authority Magazine

In-depth Interviews with Authorities in Business, Pop Culture, Wellness, Social Impact, and Tech. We use interviews to draw out stories that are both empowering and actionable.