Embedded Insiders

Embedded Insiders – Episode #25 – Hacker Deception


Listen Later

Send a text

A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and expelled. This leaves a lot of time for sensitive data to be siphoned, damaged, or, worse, for systems to be irreparably harmed. Obviously, current security technology isn't cutting it. In this week's Embedded Insiders, Brandon Lewis explains a new technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks. Known as "deception networks," the technology is still in its infancy, but has a lot of promise. An in depth article on the topic can be accessed here: http://www.embedded-computing.com/articles/deception-networks-reducing-alert-fatigue-and-increasing-security-through-an-alternate-reality


For more information, visit embeddedcomputing.com

...more
View all episodesView all episodes
Download on the App Store

Embedded InsidersBy Embedded Computing Design

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

11 ratings


More shows like Embedded Insiders

View all
Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

624 Listeners

Talk Python To Me by Michael Kennedy

Talk Python To Me

583 Listeners

Embedded by Logical Elegance

Embedded

191 Listeners

The Daily by The New York Times

The Daily

112,990 Listeners