Advertisement
Top

How 4 deception tools deliver truer network security

September 1, 2017

Via: CSO

The use of deception as a weapon has been around since the dawn of warfare, and certainly since Sun Tzu helped to define it in about 500 BC in his famous book The Art of War. In terms of modern cybersecurity, deception has also always been an option, though it was a bit clumsy when used to trick attackers into expending time and resources against bogus network assets.

The original device deployed as bait in a deception defense was the honeypot, a single server or client machine loaded with seemingly tempting information like fake credit card numbers that admins hoped hackers would bite on, leaving real assets alone.

Read More on CSO