FERNDALE – Deception has long been practiced by the military to trick an enemy into collecting bad intelligence. But deception also is the class of techniques used to fool cyber attackers. It can be fake servers and endpoints (honey pots), instrumented to detect activity. It can be poisoned data that can include “beacons.”  If someone opens the stolen document it phones home, sometimes giving away location. Often includes fake identities hidden on computers. If someone tries to log in with the fake identity you know where they broke in.  Representative vendors are TrapX, Illusive Networks, Cymmetria. Listen as cybersecurity experts Richard Stiennon and Dan Lohrmann explore cyber deception and how it can be used to defeat hackers.

To listen to this fascinating podcast, click on https://soundcloud.com/podcastdetroit/m2-episode-31-cybersecurity-part-2-deception?in=podcastdetroit/sets/m2techcast-on-podcastdetroit#t=0:00