Get a Pentest and security assessment of your IT network.

News

Salted Hash Ep 26: Deception technologies that camouflage the network

At their core, deception technologies can assist in this process, but what’s the difference between a deception vendor and a honeypot? Chris Roberts, chief security architect at Acalvio Technologies, said that the whole concept of deception technologies is the assumption that attackers are already on the network. The size of the enterprise, as well as a realistic understanding of what can be accomplished by using deception tech are major factors even if you use the non-commercial offerings. The tech by the way, isn’t new, but is a new strategy that security programs can use for both detection and response.”]

Source: https://www.csoonline.com/article/3273503/salted-hash-ep-26-deception-technologies-that-camouflage-the-network.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin