Deploying Deception in the Enterprise Network

CERT-LatestNews ThreatsCybercrime ThreatsEconomic
The goal is to have a deception layer that blends into your current environment and adapts itself as the real network changes. Here’s how. The concept of honey pots and deception in IT security has been around for about two decades. The idea is to place a fake asset in your network and then wait for attackers to interact with it.