Honeypots: Trapping masters of deception

How do you handle cyber threats from malicious actors already in side your network? Attivo Networks CTO Tony Cole has some ideas. He joined host John Gilroy this week on Federal Tech Talk.

His company specializes in an approach technically called “engagement-based attack analysis.” You may want to call it setting a trap.

Head shot of Tony Cole
Tony Cole, CTO, Attivo Networks

The idea is to set up a replica of your network that is so convincing that a malicious actor will enter the faux system and engage with it.  When that happens, Attivo can track activities and learn methods and tactics. Once an asset is “touched” an alert goes off, and systems administrators are informed.

Over the years this approach has been called a “honeypot.”

Not exactly a new concept for the military.  Trapping moves have been around since the Battle of Cannae.

Early honeypots were time-consuming and expensive to assemble. The breakthrough from Attivo is their approach gives you speed, flexibility, and scaling. Early honeypots were painstaking to construct and required hours and hours of a technician’s time.  As a result, they were difficult to deploy and scale.

Copyright © 2019 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.