Historically, the odds have always been stacked in favour of cyber attackers. … Malicious actors only need to succeed once, while cybersecurity professionals need to be succeeding 100% of the time. However, one approach that is turning all of that on its head is deception technology. This style of cyber defence enables businesses to play …
In the latest episode of the Zero Hour Podcast, Tony Cole joined Karl Sharman to discuss Threat Detection, Deception and intelligence. Tony is a veteran within cybersecurity having served in senior positions at Symantec, McAfee and FireEye over a 30 year career. Tony is now the CTO for Attivo Networks, the award-winning leader in deception for cybersecurity threat detection as well as serving as a member of the NASA Advisory Council.
Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices. Threatpost talks to Tony Cole, CTO of Attivo Networks, about how deception technology has evolved, the challenges behind and opportunities of adoption of this method of cyber defense – and how attackers are learning to adapt.
Security professionals have long dismissed security by obscurity or attempts to hide information from hackers. In such schemes, hackers will sniff through the decoys and find the real assets. A new class of security technology – distributed deception – may change that thinking. Distributed deception creates authentic-looking IT environments, complete with data and applications, to trick hackers. Through this approach, security teams can detect and stop attacks faster than through conventional means. Carolyn Crandall, chief deception officer and chief marketing officer at Attivo Networks, joins Pod2112 to talk about how distributed detection can make enterprise security more effective.