Best listening experience is on Chrome, Firefox or Safari. Subscribe to Fed Tech Talk’s audio interviews on Apple Podcasts or PodcastOne.
How do you handle cyber threats from malicious actors already in side your network? Attivo Networks CTO Tony Cole has some ideas. He joined host John Gilroy this week on Federal Tech Talk.
His company specializes in an approach technically called “engagement-based attack analysis.” You may want to call it setting a trap.
The idea is to set up a replica of your network that is so convincing that a malicious actor will enter the faux system and engage with it. When that happens, Attivo can track activities and learn methods and tactics. Once an asset is “touched” an alert goes off, and systems administrators are informed.
Over the years this approach has been called a “honeypot.”
Not exactly a new concept for the military. Trapping moves have been around since the Battle of Cannae.
Early honeypots were time-consuming and expensive to assemble. The breakthrough from Attivo is their approach gives you speed, flexibility, and scaling. Early honeypots were painstaking to construct and required hours and hours of a technician’s time. As a result, they were difficult to deploy and scale.