Embedded Insiders – Episode #25 – Hacker Deception

August 4, 2017 Embedded Computing Design

A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and expelled. This leaves a lot of time for sensitive data to be siphoned, damaged, or, worse, for systems to be irreparably harmed. Obviously, current security technology isn't cutting it. In this week's Embedded Insiders, Brandon Lewis explains a new technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks. Known as "deception networks," the technology is still in its infancy, but has a lot of promise. An in depth article on the topic can be accessed here: http://www.embedded-computing.com/articles/deception-networks-reducing-alert-fatigue-and-increasing-security-through-an-alternate-reality

Previous Article
Embedded Insiders Podcast – Keeping an eye on connected devices with data categorization
Embedded Insiders Podcast – Keeping an eye on connected devices with data categorization

"Data categorization" is helpful in support business of intelligence applications, but it's also an elegant...

Next Article
Back the the future with the Kontron/S&T merger
Back the the future with the Kontron/S&T merger

The Insiders learn how S&T’s software and middleware solutions complement Kontron’s hardware offerings, esp...