Page 17 - Cyber Defense eMagazine - December 2017
P. 17

WHY DECEPTION TECHNOLOGY WILL CHANGE THE GAME

               IN OUR FAVOR AGAINST CYBERCRIME AND BREACHES




               As I said in my recent presentation on Time-based Security, which was first discovered
               and written about by Winn Schwartau in his book of the same title, either we find a way

               to make breaches go slower or we must be able to detect and respond to them much

               faster.  On one side of the coin, we have the concept of honeypots and encryption and
               on the other side we have real-time threat intelligence through A.I., machine learning

               and human intelligence.

               I’ve looked into honeypots for many years.  I love http://www.honeynet.org because it is

               the  first  open  source  concept  on  deception  technology  that  made  it  mainstream.

               However, many of us want to buy a commercial solution, just like, while it’s fun to deploy
               IP Tables, none of us really want to build our own firewall from scratch.


               Then, I heard about Attivo and as one of the four CDM judges on our Infosec Awards

               from 2017, with them being one of our winners, receiving an overwhelming positive vote
               from the judges, I wanted to dig into what they are up to a little further and look at them

               within the purview of the Time-based Security model – could a solution like the Attivo
               ThreatDefend™ Deception and Response Platform actually deliver a way to slow down

               the breaches, because, frankly, we’re not yet going fast enough to stop them?


               With  over  1500  breaches  reported  throughout  the  USA  in  2017  alone,  one  has  to

               wonder how attackers are able to bypass and remain undetected by security solutions
               that  are  available  from  over  3000  security  technology  providers.  One  could  point  to

               sophisticated  automated  and  human  attacks  that  are  leveraging  an  evolving  attack
               surface  to  penetrate  perimeter  defenses.  However,  most  security  professionals  have

               come  to  accept  that  attackers  can  and  will  get  into  the  network  based  on  targeted
               attacks, human error, insiders, contractors or suppliers.








                   17    Cyber Defense eMagazine – December 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   12   13   14   15   16   17   18   19   20   21   22