
Sign up to save your podcasts
Or


Send us a text
A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and expelled. This leaves a lot of time for sensitive data to be siphoned, damaged, or, worse, for systems to be irreparably harmed. Obviously, current security technology isn't cutting it. In this week's Embedded Insiders, Brandon Lewis explains a new technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks. Known as "deception networks," the technology is still in its infancy, but has a lot of promise. An in depth article on the topic can be accessed here: http://www.embedded-computing.com/articles/deception-networks-reducing-alert-fatigue-and-increasing-security-through-an-alternate-reality
For more information, visit embeddedcomputing.com
By Embedded Computing Design4.2
1111 ratings
Send us a text
A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and expelled. This leaves a lot of time for sensitive data to be siphoned, damaged, or, worse, for systems to be irreparably harmed. Obviously, current security technology isn't cutting it. In this week's Embedded Insiders, Brandon Lewis explains a new technology that expands on the honeypot model in the hopes of stopping lateral network attacks dead in their tracks. Known as "deception networks," the technology is still in its infancy, but has a lot of promise. An in depth article on the topic can be accessed here: http://www.embedded-computing.com/articles/deception-networks-reducing-alert-fatigue-and-increasing-security-through-an-alternate-reality
For more information, visit embeddedcomputing.com

90,931 Listeners

43,815 Listeners

32,007 Listeners

229,029 Listeners

625 Listeners

585 Listeners

190 Listeners

112,360 Listeners