AST *Fully Interactive* Magazine | Page 27

Nation-states will not stop attacking one another — especially since the internet has made espionage both cheaper and more asymmetric . North Korea might not be able to take on the US directly , but they can level the playing field through cyber warfare .

www . AmericanSecurityToday . com August 2021 - Edition 57

With that in mind , the need for tools like cyber deception and identity detection and response ( IDR ) technology has never been greater .

Defenders , particularly those in the orbit of government and homeland security agencies , need solid in-network defenses that can identify and derail attackers as they attempt to move throughout the network — even if those attacks are using valid credentials . The evolution of both attack tactics and the strategies needed to combat them has brought about significant changes in the cybersecurity industry .

The Evolution of Deception Technology

Even though my introduction to deception technology was via honeypots , it is essential to emphasize that deception has come a long way since then .

The misconception persists that deception technology and honeypots are interchangeable , but today ’ s technology cloaks the network in an entire deceptive fabric .

Attivo jumped into the space as the leader in deceiving and detecting adversaries from the network side , focused on identifying lateral movement

27