decoy Blog Terms - Attivo Networks

decoy

Deciphering Deception Believability

Written by: Carolyn Crandall, Chief Deception Officer – Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation that need to be in place for believability.

Keeping it Real with Authentic Deception Technology

Written by: Mike Parking – Technical Marketing Engineer – In a previous blog post, I covered what I call the ‘sweet spot’ for deception, which describes the characteristics and quality deceptive assets need to have to look like the real thing if they’re going to be effective against a skilled attacker. That brings us to the idea of “keeping it real,” which sounds like a contradiction when the subject is deception. It’s not though. The core of effective deception is creating assets that an attacker can’t tell from the real thing. They look real. They act real. To an attacker, they are real.

Scroll to Top