Page 17 - Cyber Defense eMagazine - December 2017
P. 17
WHY DECEPTION TECHNOLOGY WILL CHANGE THE GAME
IN OUR FAVOR AGAINST CYBERCRIME AND BREACHES
As I said in my recent presentation on Time-based Security, which was first discovered
and written about by Winn Schwartau in his book of the same title, either we find a way
to make breaches go slower or we must be able to detect and respond to them much
faster. On one side of the coin, we have the concept of honeypots and encryption and
on the other side we have real-time threat intelligence through A.I., machine learning
and human intelligence.
I’ve looked into honeypots for many years. I love http://www.honeynet.org because it is
the first open source concept on deception technology that made it mainstream.
However, many of us want to buy a commercial solution, just like, while it’s fun to deploy
IP Tables, none of us really want to build our own firewall from scratch.
Then, I heard about Attivo and as one of the four CDM judges on our Infosec Awards
from 2017, with them being one of our winners, receiving an overwhelming positive vote
from the judges, I wanted to dig into what they are up to a little further and look at them
within the purview of the Time-based Security model – could a solution like the Attivo
ThreatDefend™ Deception and Response Platform actually deliver a way to slow down
the breaches, because, frankly, we’re not yet going fast enough to stop them?
With over 1500 breaches reported throughout the USA in 2017 alone, one has to
wonder how attackers are able to bypass and remain undetected by security solutions
that are available from over 3000 security technology providers. One could point to
sophisticated automated and human attacks that are leveraging an evolving attack
surface to penetrate perimeter defenses. However, most security professionals have
come to accept that attackers can and will get into the network based on targeted
attacks, human error, insiders, contractors or suppliers.
17 Cyber Defense eMagazine – December 2017 Edition
Copyright © 2017, Cyber Defense Magazine, All rights reserved worldwide.