Embedded Insiders Podcast: Hacker deception

By Rich Nass

Executive Vice President

Embedded Computing Design

August 04, 2017

In this week's Embedded Insiders, Brandon Lewis explains a technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks ??deception networks.

A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and expelled. This leaves a lot of time for sensitive data to be siphoned, damaged, or, worse, for systems to be irreparably harmed. Obviously, current security technology isn't cutting it.

In this week's Embedded Insiders, Brandon Lewis explains a new technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks. Known as "deception networks," the technology is still in its infancy, but has a lot of promise.

An in depth article on the topic can be accessed here: www.embedded-computing.com/articles/deception-networks-reducing-alert-fatigue-and-increasing-security-through-an-alternate-reality.

 

Topics include:

  • Cybersecurity
  • IoT
  • Networking
  • Deception networks
  • Honeypots
  • Alert fatigue

Richard Nass’ key responsibilities include setting the direction for all aspects of OSM’s ECD portfolio, including digital, print, and live events. Previously, Nass was the Brand Director for Design News. Prior, he led the content team for UBM’s Medical Devices Group, and all custom properties and events. Nass has been in the engineering OEM industry for more than 30 years. In prior stints, he led the Content Team at EE Times, Embedded.com, and TechOnLine. Nass holds a BSEE degree from NJIT.

More from Rich

Categories
Security