Deception technology is less of a fringe player these days thanks to more manageable and affordable product offerings. Deception focuses on deploying assets such as lures, bogus files, honeypots or simulated SCADA or IoT devices in hopes of diverting attackers. Lures or breadcrumbs can give a clue to attackers modus operandi, but interaction between it and attacker is fleeting. Whether deception works for an organization depends on how well the deceptions are deployed and how much time an organization is willing to invest in maintenance and ensuring the intelligence translates into something actionable.”]
Source: https://www.cuinfosecurity.com/making-most-investment-in-deception-technology-a-12881

