Embedded Insiders

Embedded Insiders – Episode #25 – Hacker Deception


Listen Later

Send us a text

A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and expelled. This leaves a lot of time for sensitive data to be siphoned, damaged, or, worse, for systems to be irreparably harmed. Obviously, current security technology isn't cutting it. In this week's Embedded Insiders, Brandon Lewis explains a new technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks. Known as "deception networks," the technology is still in its infancy, but has a lot of promise. An in depth article on the topic can be accessed here: http://www.embedded-computing.com/articles/deception-networks-reducing-alert-fatigue-and-increasing-security-through-an-alternate-reality


For more information, visit embeddedcomputing.com

...more
View all episodesView all episodes
Download on the App Store

Embedded InsidersBy Embedded Computing Design

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

11 ratings


More shows like Embedded Insiders

View all
This American Life by This American Life

This American Life

90,931 Listeners

Radiolab by WNYC Studios

Radiolab

43,815 Listeners

Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,007 Listeners

The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

229,029 Listeners

Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

625 Listeners

Talk Python To Me by Michael Kennedy

Talk Python To Me

585 Listeners

Embedded by Logical Elegance

Embedded

190 Listeners

The Daily by The New York Times

The Daily

112,360 Listeners