AST June 2018 Magazine Volume 24 | Page 68

Outwitting an adversary is rarely accomplished without a balance of defensive and offensive measures , and deception brings the offense into the realm of cybersecurity with the ability to deceive and misdirect an attacker into revealing themselves .
All , without false positive alert fatigue and the burden of operational overhead associated with traditional detection methods .
Given its efficacy in detection and ability to gather intelligence to diffuse the attacker , deception is rapidly becoming a de facto security control for closing the detection gap and for being able to reliably answer the question of whether there are threats inside the network .
The challenge with current detection solutions is that they are reliant on signatures , pattern matching , or behavioral anomaly detection and as such , are limited in efficacy or take time to “ get good .”
A new approach is needed , one that is accurate and actionable .
Volume 24

What ’ s Different June 2018 Edition with Deception ?

( See a brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform .)

Outwitting an adversary is rarely accomplished without a balance of defensive and offensive measures , and deception brings the offense into the realm of cybersecurity with the ability to deceive and misdirect an attacker into revealing themselves .

All , without false positive alert fatigue and the burden of operational overhead associated with traditional detection methods .

Given its efficacy in detection and ability to gather intelligence to diffuse the attacker , deception is rapidly becoming a de facto security control for closing the detection gap and for being able to reliably answer the question of whether there are threats inside the network .

The challenge with current detection solutions is that they are reliant on signatures , pattern matching , or behavioral anomaly detection and as such , are limited in efficacy or take time to “ get good .”

The learning and tuning process inherently produces false positive noise that will drain resources and create alert fatigue .

A new approach is needed , one that is accurate and actionable .

This new approach is deception , which delivers accurate , early detection , evidence-based
( Carolyn Crandall , Chief Deception Officer of Attivo Networks Interviews Tony Cole , Chief Technology Officer of Attivo Networks to discuss Why CISOs Need to Shift Focus to Detection .
66