How can enterprises leverage deception technology to protect against cyber criminals?
Although deception technology sounds like something in the attacker’s toolkit, it’s actually for organisations to take advantage of against malicious actors
Although deception technology sounds like something in the attacker’s toolkit, it’s actually for organisations to take advantage of against malicious actors
Short of that, it’s key to remember that you are the target and you must adapt to the inevitability of a breach. Prepare for the inevitable by hunting, using active cyber defense, building a real security awareness training program and leveraging the home-field advantage.
Written by: Carolyn Crandall, Chief Deception Officer and CMO -Insight into the IoT Public Security Announcement and the Role of Attivo Networks Deception Technology in Mitigating IoT Risks
Carolyn Crandall, chief deception officer for security company Attivo Networks, says, “Healthcare IT teams need tools in their arsenal that not only defend the network perimeter but also help them detect and respond to in-network threats quickly, efficiently, and effectively.” These tools, of course, include a technology Attivo sells: deception software.
“The biggest threat posed by cyber-criminals today is their ability to remain undetected in the network for months, once they have bypassed perimeter defences,” he said. “New technologies and approaches like deception-based threat detection will be one of the techniques and investments that organisations will adopt to close this gap and strengthen overall defences.”
Deception technology is a powerful tool that can help secure company assets, safeguard patient data and transform the network into an environment where the attacker cannot determine what is real and what is fake. These traps and lures detect lateral movement, credential theft, ransomware and Active Directory reconnaissance, ultimately revealing an attacker’s activities as they try to scan systems or attempt to download malware onto medical devices.
By: Carolyn Crandall Smart medical devices have incredible potential to save lives and improve our general well-being, but they also present a host of untold threats that have yet to be fully exploited. You’ve probably heard the infamous story by now. Several years ago, it was revealed that Dick Cheney’s defibrillator was modified to prevent hacking. While Cheney’s medical team was quick to address this particular issue, the larger healthcare community has been slower to react to persistent threats and medical device security remains a growing concern even 11 years later. Almost 36 (35.6) percent of organizations’ IoT-connected medical device ecosystems experienced a cybersecurity incident in the past year, a recent Deloitte survey revealed. That’s more than one third of organizations experiencing some type of threat to the smart medical devices they are in charge of protecting.
Mobility has become a critical factor instrumental in making a city smarter, sustainable and resilient. Our world has never been more connected than in this day and age. Approximately 11 billion devices are connected to the Internet at present and this number is likely to triple by 2020 and by 2025, 80 billion devices will be connected to the Internet.
Carrying forward this blazing trend, most countries in the Middle East have placed smart city initiatives at the heart of their future development plans in some shape or form. The Middle East and Africa (MEA) will invest more than $6.6 billion in Internet of Things (IoT) hardware, software, services, and connectivity in 2016 – which is expected to increase to $14.3 billion by 2020. And, transportation is one of the vertical industries leading in terms of IoT investments in the region.
This week Attivo Networks announced the first deception-based threat detection platform for the Internet of Things. This is another example of Attivo innovation and high demand for threat detection products, developed as a direct result of customer demand and the need for new approaches to security in an ever-changing security landscape. Our customer engagements have grown into the hundreds in a wide variety of vertical markets and corporate sizes and with this we have seen a strong demand for real-time detection in user-networks, data centers, cloud, ICS-SCADA and most recently in IoT. With Gartner forecasting 6.4 connected things to be in use worldwide this year there is a tremendous need for a solution to this new set of cybersecurity risk and the need for real-time attack detection. The new enhancement is available as a feature in the Attivo BOTsink Deception Platform and will allow organizations to configure the Attivo deception servers and decoys to look identical to IoT devices.
Attivo Networks today announced an expansion of the Attivo Deception Platform, which provides real-time threat detection and accelerated incident response, to now support the Internet of Thing (IoT) ecosystem. This new enhancement complements the existing Deception Platform that supports user networks, data centers, cloud and ICS-SCADA environments. “Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015”, bringing a whole new set of cybersecurity risk and the need for real-time attack detection.