1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: The story of the honeypot: A tale of deception

Discussion in 'CSO' started by RSS, Jun 21, 2016.

  1. RSS

    RSS New Member Member

    Looking at the attacker instead of the attack
    Image by Pixabay

    Honeypots have been around for decades. Deception elements have been used by network defenders for many years, but deception technology has matured by leveraging the fact that attackers are human, and can make mistakes. Cyber deception takes advantage of these mistakes, leading attackers through a pre-planned path to where the defenders want them to be. Gadi Evron, former vice president of Kaspersky and PricewaterhouseCoopers and now founder and CEO of Cymmetria walked me through the process of a decoy server and showed me how to control information so that attackers are diverted to where you want them to go.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page