Security News > 2020 > January > How Deception Technologies Enable Proactive Cyberdefense
Much more powerful, deception technologies leverage artificial intelligence and machine learning to enable the automated deployment of fake content, lists, databases and access points that play directly into the attackers' desires and then trap them into false storage or network areas and occupy them until the threat can be contained.
Deception technologies enable the sort of proactive defense strategy that the industry can easily adopt to help to reduce data breaches.
The machine learning components can be modeled to dynamically recreate new deceptive network models - either randomly or on a fixed schedule - to ensure that savvy intruders are continually outwitted even if they suspect that deception technologies have been deployed.
The application of deception technologies allows organizations to leverage the existing network infrastructure to detect intruders early, thus reducing the attack surface and enabling the collection of adversarial threat intelligence along the way.
Implementing deception technologies not only attacks the attackers during their forays through the initial access steps as they attempt to locate targeted assets, but it also moves away from the conventional challenges and expenses associated with implementing and integrating point solution technologies that manage access to the computing environment.
News URL
https://www.inforisktoday.com/blogs/how-deception-technologies-enable-proactive-cyberdefense-p-2855