and www . AmericanSecurityToday privileges escalation . com August 2021 - Edition 57 while leading adversaries into a decoy environment .
And because the attackers don ’ t know that the environment they find themselves in isn ’ t real , defenders can study their tactics as they attempt to continue their attacks .
It ’ s safe to say that this goes much , much further than a traditional honeypot .
Over the past several years , it has been advantageous to see deception technology take a more prominent place within cybersecurity discourse .
CourtesyoftheNSA
The National Security Agency ( NSA ) recently released a new issue of The Next Wave , its review of emerging technologies , that focused heavily on deception .
One section , titled ‘ Building the Science of Defensive Cyber Deception ,’ touched on network deception and hostbased deception , two of Attivo ’ s most critical areas of focus .