AST *Fully Interactive* Magazine | Page 28

Courtesy of the NSA

and www . AmericanSecurityToday privileges escalation . com August 2021 - Edition 57 while leading adversaries into a decoy environment .

And because the attackers don ’ t know that the environment they find themselves in isn ’ t real , defenders can study their tactics as they attempt to continue their attacks .

It ’ s safe to say that this goes much , much further than a traditional honeypot .

Over the past several years , it has been advantageous to see deception technology take a more prominent place within cybersecurity discourse .

Courtesy of the NSA

The National Security Agency ( NSA ) recently released a new issue of The Next Wave , its review of emerging technologies , that focused heavily on deception .

One section , titled ‘ Building the Science of Defensive Cyber Deception ,’ touched on network deception and hostbased deception , two of Attivo ’ s most critical areas of focus .

28