Story image

Could deception methods be the new answer to cybersecurity?

27 Feb 17

Frost & Sullivan says that deception technology could be a valuable weapon for fooling cyber attackers, particularly once they’re already inside your systems.

The company released a white paper on behalf of illusive networks, titled Why Deception is Essential to Your Cybersecurity Strategy, which says that organisations are unable to detect attackers for almost five months once they are inside systems, but deceiving attackers along the way can tip the playing field in your favour. 

Frost & Sullivan says that defence and prevention are only wasting expenditures because cyber adversaries just keep coming. 

“The inevitable conclusion is that new approaches are overdue in stopping cyber adversaries in their tracks,” illusive networks says.

Michael Suby, Frost & Sullivan’s vice president of research, says that once attackers have made it inside an organisation’s walls, current detection methods are inadequate.

"A new approach to detecting attackers in an enterprise network must be part of a modern cybersecurity arsenal,” he says.

When applying deceptions, it’s also not enough to target limited sections of an enterprise network. Frost & Sullivan recommends that the entire network is covered. Deception technology can set realistic and tailored deceptions anywhere in an enterprise network. This can detect and identify both the location and existence of attackers as they begin their attacks.

"As pioneers of deception-based cybersecurity, it's great to gain such positive praise from a leading analyst such as Michael Suby. With ever increasing sophisticated attacks on organizations, he recognizes that our agentless technology provides high fidelity detection and is an optimal, forward-thinking solution for CISOs and CIOs,” says illusive networks CEO Ofer Israeli.

Frost & Sullivan concludes that this method could be the illusive approach to effective deception.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.