Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires

M Kahlhofer, S Achleitner, S Rass… - Proceedings of the 27th …, 2024 - dl.acm.org
Fooling adversaries with traps such as honeytokens can slow down cyber attacks and create
strong indicators of compromise. Unfortunately, cyber deception techniques are often poorly …

Poster: Formalizing Cognitive Biases for Cybersecurity Defenses

J Vang, M Revelle - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
As network attacks are becoming increasingly sophisticated, there is a need to develop new
defense techniques. Recent work has demonstrated the successful use of cognitive biases …

The Crucial Role of Red Teaming: Strengthening Indonesia's Cyber Defenses Through Cybersecurity Drill Tests.

S Yulianto, B Soewito, FL Gaol… - International Journal of …, 2024 - search.ebscohost.com
This study delves into the critical role of red teaming in strengthening Indonesia's
cybersecurity framework, with a particular emphasis on the heavily regulated banking and …