Training

When: Every first Sunday of every month -get a ticket- from $15 (Click Here).

Monday, September 2, 2019

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker To Do? – Brilliance Security Magazine

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker To Do? – Brilliance Security Magazine: Deception is a breach detection tactic that utilizes decoys and misinformation to divert and delay an adversary. As part of your overall cybersecurity strategy, this tactic gives the SOC / IR teams sufficient time to perform remediation before an adversary can complete their mission. Deception is not generally used to detect intrusion attempts or even breach attempts but will let you know when your perimeter protection fails. It is best used for detection of actual breaches, not breach attempts – there are other solutions for detecting breach attempts. It is a great prevention failure detection solution because it focuses detection capabilities on adversaries and malware that have already successfully bypassed your prevention capabilities.

We wanted to learn more about Enterprise Deception Solutions, so we spoke with John Bradshaw of Acalvio. Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage, and respond to malicious activity inside the perimeter.

In a recent white paper, John said, “I first heard the term “Prevention Failure Detection” from a friend of mine, Tim Crothers, Vice-President of Cyber Security for Target Corporation. PFD refocuses your de

No comments: