Deception for proactive defense

5-10-1

This article is fourth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of using deception as part of a proactive defense, including strategies for deception deployment, post-compromise, incident response, and mitigation against returning attackers.

Click here to view original webpage at www.helpnetsecurity.com

Categories:

Your e-mail address will not be published.
Required fields are marked*