1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Virtual environments make it easy to deploy deception technology

Discussion in 'Network World' started by RSS, May 6, 2016.

  1. RSS

    RSS New Member Member

    This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

    Cyber attackers use deception to try to get inside your network by doing everything from spoofing email addresses in spear phishing attacks to hiding malware on legitimate websites. So, if deception is standard operating procedure for the bad guys, perhaps it's time to fight back with some deception of your own. In fact, Gartner says it's a good complement to your existing security infrastructure.

    Deception technology designed to lure and trap malicious actors has been around since at least 1999 when Lance Spitzner, founder of the Honeynet Project, published a paper on how to build a honeypot. Early honeynets were pretty resource intensive and they had to be maintained to ensure the honeynet wasn't turned against the host organization. Since then, the advent of virtual machines has helped ease the deployment and use of deception technology.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page