1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

The ins and outs of deception for cyber security

Discussion in 'Network World' started by RSS, Jan 6, 2016.

  1. RSS

    RSS New Member Member

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

    It is no longer debated that a prevention only security strategy is enough. Security teams must go on the offense and create an environment that provides continuous real-time detection against an ever-changing landscape of cyber threats, and deception tools can play a critical role.

    Deception as a strategy has been used for years in war and, notably, by cyber attackers. However, using deception to address threats that have bypassed traditional prevention security measures is an emerging and additional line of defense. Today’s deception-based technology abandons the reliance on known attack patterns and monitoring, and instead uses advanced luring techniques and engagement servers to entice an attacker away from valuable company servers.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page