7 top deception technology vendors for active defense
searchsecurity.techtarget.comOnce reserved for the most mature organizations, cyber deception technology is picking up steam on the ground and in practice. Here are seven platforms for CISOs to consider.
- Karen Scarfone, Scarfone Cybersecurity
Cyber deception involves identifying adversaries by luring them into interacting with fake digital assets. It's a longstanding practice that was historically impractical for most organizations to implement. In recent years, however, a variety of products and services have emerged that make cyber deception widely accessible.
This article presents key factors to consider and features to look for when purchasing cyber deception technologies, along with a list of some of the top deception technology vendors.
Copyright of this story solely belongs to searchsecurity.techtarget.com . To see the full text click HERE