Embedded Insiders Podcast – Hacker deception

August 4, 2017 Rich Nass, Brand Director, and Brandon Lewis, Technology Editor

A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and expelled. This leaves a lot of time for sensitive data to be siphoned, damaged, or, worse, for systems to be irreparably harmed. Obviously, current security technology isn't cutting it.

In this week's Embedded Insiders, Brandon Lewis explains a new technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks. Known as "deception networks," the technology is still in its infancy, but has a lot of promise.

An in depth article on the topic can be accessed here: www.embedded-computing.com/articles/deception-networks-reducing-alert-fatigue-and-increasing-security-through-an-alternate-reality.

 

Topics include:

  • Cybersecurity
  • IoT
  • Networking
  • Deception networks
  • Honeypots
  • Alert fatigue

Previous Article
Securing the Internet of Things against DDoS threats

Internet-based home automation devices, such as video baby monitors, remote thermostat programming, home su...

Next Article
Deception networks: Reducing alert fatigue and increasing security through an alternate reality
Deception networks: Reducing alert fatigue and increasing security through an alternate reality

Deception networks provide an upgrade over honeypot technology to reduce alert fatigue and increase cyber s...

×

Stay updated on security-related design topics with the security edition of our Embedded Daily newsletter.

Subscribed! Look for 1st copy soon.
Error - something went wrong!